mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-08-21 05:53:30 -07:00
WPAD Poisoner back online, removed options in config file and rellative code for choosing which DNS server to use. (there really was not point in keeping it)
the --basic and --force options and the EXE serving in the Responder plugin have been removed, until I can find a better way of implementing them. Modified and re-added the JS-keylogger and SMBauth plugins
This commit is contained in:
parent
aa4e022ab0
commit
5d07551a50
13 changed files with 312 additions and 165 deletions
|
@ -28,7 +28,6 @@
|
|||
#Here you can configure MITMf's internal DNS server
|
||||
#
|
||||
|
||||
resolver = dnschef #Can be set to 'twisted' or 'dnschef' ('dnschef' is highly reccomended)
|
||||
tcp = Off #Use the TCP DNS proxy instead of the default UDP (not fully tested, might break stuff!)
|
||||
port = 53 #Port to listen on
|
||||
ipv6 = Off #Run in IPv6 mode (not fully tested, might break stuff!)
|
||||
|
@ -119,22 +118,8 @@
|
|||
#Set this option with specific NBT-NS/LLMNR names not to respond to (default = None). Example: DontRespondTo = NAC, IPS, IDS
|
||||
DontRespondToName =
|
||||
|
||||
[[HTTP Server]]
|
||||
|
||||
#Set this to On if you want to always serve a specific file to the victim.
|
||||
Serve-Always = Off
|
||||
|
||||
#Set this to On if you want to serve an executable file each time a .exe is detected in an URL.
|
||||
Serve-Exe = Off
|
||||
|
||||
#Uncomment and specify a custom file to serve, the file must exist.
|
||||
Filename = config/responder/Denied.html
|
||||
|
||||
#Specify a custom executable file to serve, the file must exist.
|
||||
ExecFilename = config/responder/FixInternet.exe
|
||||
|
||||
#Set your custom PAC script
|
||||
WPADScript = 'function FindProxyForURL(url, host){if ((host == "localhost") || shExpMatch(host, "localhost.*") ||(host == "127.0.0.1") || isPlainHostName(host)) return "DIRECT"; if (dnsDomainIs(host, "RespProxySrv")||shExpMatch(host, "(*.RespProxySrv|RespProxySrv)")) return "DIRECT"; return "PROXY ISAProxySrv:3141; DIRECT";}'
|
||||
#Set your custom PAC script
|
||||
WPADScript = 'function FindProxyForURL(url, host){if ((host == "localhost") || shExpMatch(host, "localhost.*") ||(host == "127.0.0.1") || isPlainHostName(host)) return "DIRECT"; if (dnsDomainIs(host, "RespProxySrv")||shExpMatch(host, "(*.RespProxySrv|RespProxySrv)")) return "DIRECT"; return "PROXY ISAProxySrv:3141; DIRECT";}'
|
||||
|
||||
[[HTTPS Server]]
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue