mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-06 13:02:24 -07:00
modified outout formatting
This commit is contained in:
parent
a7e3e4eddf
commit
27552b08a0
4 changed files with 8 additions and 6 deletions
2
mitmf.py
2
mitmf.py
|
@ -64,7 +64,7 @@ if __name__ == "__main__":
|
|||
log_level = logging.__dict__[args.log_level.upper()]
|
||||
|
||||
#Start logging
|
||||
logging.basicConfig(level=log_level, format='%(asctime)s %(message)s',stream=args.write)
|
||||
logging.basicConfig(level=log_level, format="%(asctime)s %(message)s", datefmt="%Y-%m-%d %H:%M:%S", stream=args.write)
|
||||
|
||||
#All our options should be loaded now, pass them onto plugins
|
||||
print "[*] MITMf v%s started... initializing plugins and modules" % mitmf_version
|
||||
|
|
|
@ -60,7 +60,7 @@ class ArpSpoof(Plugin):
|
|||
|
||||
def send_packets(self,pkt,interface):
|
||||
while self.send == True:
|
||||
sendp(pkt, inter=2, iface=interface)
|
||||
sendp(pkt, inter=2, iface=interface, verbose=False)
|
||||
|
||||
def build_req(self):
|
||||
if self.target == None:
|
||||
|
|
|
@ -33,6 +33,8 @@ class Inject(CacheKill,Plugin):
|
|||
self.dtable = {}
|
||||
self.count = 0
|
||||
self.mime = "text/html"
|
||||
print "[*] %s plugin online" % self.name
|
||||
|
||||
|
||||
def handleResponse(self,request,data):
|
||||
#We throttle to only inject once every two seconds per client
|
||||
|
@ -46,7 +48,7 @@ class Inject(CacheKill,Plugin):
|
|||
self.ctable[ip] = time.time()
|
||||
self.dtable[ip+hn] = True
|
||||
self.count+=1
|
||||
logging.info("Injected malicious html.")
|
||||
logging.info("%s [%s] Injected malicious html" % (request.client.getClientIP(), request.headers['host']))
|
||||
return {'request':request,'data':data}
|
||||
else:
|
||||
return
|
||||
|
|
|
@ -78,7 +78,7 @@ class ServerConnection(HTTPClient):
|
|||
#Handle the browserprofiler plugin output
|
||||
if 'clientprfl' in self.uri:
|
||||
out = pformat(self.post2dict(self.postData))
|
||||
logging.warning(str(self.client.getClientIP()) + " Browser Profilerer data:\n" + out)
|
||||
logging.warning("%s Browser Profilerer data:\n%s" % (self.client.getClientIP(), out))
|
||||
|
||||
#Handle the jskeylogger plugin output
|
||||
elif 'keylog' in self.uri:
|
||||
|
@ -99,10 +99,10 @@ class ServerConnection(HTTPClient):
|
|||
except:
|
||||
print "ERROR: unknown char " + n
|
||||
|
||||
logging.warning(str(self.client.getClientIP()) + " ["+ self.headers['host'] + "] " "Keys: " + nice)
|
||||
logging.warning("%s [%s] Keys: %s" % (self.client.getClientIP(), self.headers['host'], nice))
|
||||
|
||||
else:
|
||||
logging.warning(self.getPostPrefix() + " Data (" + self.headers['host'] + "):\n" + str(self.postData))
|
||||
logging.warning("%s Data (%s):\n%s" % (self.getPostPrefix(),self.headers['host'],self.postData))
|
||||
self.transport.write(self.postData)
|
||||
|
||||
def connectionMade(self):
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue