From 61d602c5f0e178001e65d011ec861f453a793423 Mon Sep 17 00:00:00 2001 From: Dillon Korman Date: Sun, 31 May 2015 12:11:12 -1000 Subject: [PATCH] Cleaned up readme Various improvements with grammar and style. --- README.md | 60 +++++++++++++++++++++++++++---------------------------- 1 file changed, 30 insertions(+), 30 deletions(-) diff --git a/README.md b/README.md index 3a43c32..49dd3e8 100644 --- a/README.md +++ b/README.md @@ -3,7 +3,7 @@ MITMf V0.9.7 Framework for Man-In-The-Middle attacks -Quick tutorials, examples and dev updates at http://sign0f4.blogspot.it +Quick tutorials, examples and developer updates at: http://sign0f4.blogspot.it This tool is based on [sergio-proxy](https://github.com/supernothing/sergio-proxy) and is an attempt to revive and update the project. @@ -12,25 +12,25 @@ Contact me at: - IRC on Freenode: #MITMf - Email: byt3bl33d3r@gmail.com -**Before submitting issues please read the [FAQ](#faq) and the appropriate [section](#submitting-issues).** +**Before submitting issues, please read the [FAQ](#faq) and the appropriate [section](#submitting-issues).** Available plugins ================= -- ```Screenshotter``` - Uses HTML5 Canvas to render an accurate screenshot of a clients browser +- ```Screenshotter``` - Uses HTML5 Canvas to render an accurate screenshot of a client's browser - ```Responder``` - LLMNR, NBT-NS, WPAD and MDNS poisoner - ```SSLstrip+``` - Partially bypass HSTS -- ```Spoof``` - Redirect traffic using ARP Spoofing, ICMP Redirects or DHCP Spoofing -- ```BeEFAutorun``` - Autoruns BeEF modules based on clients OS or browser type -- ```AppCachePoison``` - Perform App cache poisoning attacks +- ```Spoof``` - Redirect traffic using ARP spoofing, ICMP redirects or DHCP spoofing +- ```BeEFAutorun``` - Autoruns BeEF modules based on a client's OS or browser type +- ```AppCachePoison``` - Perform app cache poisoning attacks - ```Ferret-NG``` - Transperently hijacks sessions - ```BrowserProfiler``` - Attempts to enumerate all browser plugins of connected clients - ```CacheKill``` - Kills page caching by modifying headers -- ```FilePwn``` - Backdoor executables being sent over HTTP using the Backdoor Factory and BDFProxy +- ```FilePwn``` - Backdoor executables sent over HTTP using the Backdoor Factory and BDFProxy - ```Inject``` - Inject arbitrary content into HTML content - ```BrowserSniper``` - Performs drive-by attacks on clients with out-of-date browser plugins -- ```jskeylogger``` - Injects a javascript keylogger into clients webpages +- ```jskeylogger``` - Injects a Javascript keylogger into a client's webpages - ```Replace``` - Replace arbitary content in HTML content -- ```SMBAuth``` - Evoke SMB challenge-response auth attempts +- ```SMBAuth``` - Evoke SMB challenge-response authentication attempts - ```Upsidedownternet``` - Flips images 180 degrees Changelog @@ -40,50 +40,50 @@ Changelog - ```SessionHijacker``` is replaced with ```Ferret-NG```, captures cookies and starts a proxy that will feed them to connected clients -- ```JavaPwn``` plugin replced with ```BrowserSniper```, now supports java, flash and browser exploits +- ```JavaPwn``` plugin replced with ```BrowserSniper```, now supports Java, Flash and browser exploits -- Addition of the ```Screenshotter``` plugin, able to render screenshots of a clients browser at regular intervals +- Addition of the ```Screenshotter``` plugin, able to render screenshots of a client's browser at regular intervals - Addition of a fully functional SMB server using the [Impacket](https://github.com/CoreSecurity/impacket) library -- Addition of [DNSChef](https://github.com/iphelix/dnschef), the framework is now a IPv4/IPv6 (TCP & UDP) DNS server ! Supported queries are: 'A', 'AAAA', 'MX', 'PTR', 'NS', 'CNAME', 'TXT', 'SOA', 'NAPTR', 'SRV', 'DNSKEY' and 'RRSIG' +- Addition of [DNSChef](https://github.com/iphelix/dnschef), the framework is now a IPv4/IPv6 (TCP & UDP) DNS server! Supported queries are: 'A', 'AAAA', 'MX', 'PTR', 'NS', 'CNAME', 'TXT', 'SOA', 'NAPTR', 'SRV', 'DNSKEY' and 'RRSIG' - Integrated [Net-Creds](https://github.com/DanMcInerney/net-creds) currently supported protocols are: - FTP, IRC, POP, IMAP, Telnet, SMTP, SNMP (community strings), NTLMv1/v2 (all supported protocols like HTTP, SMB, LDAP etc..) and Kerberos + FTP, IRC, POP, IMAP, Telnet, SMTP, SNMP (community strings), NTLMv1/v2 (all supported protocols like HTTP, SMB, LDAP etc.) and Kerberos -- Integrated [Responder](https://github.com/SpiderLabs/Responder) to poison LLMNR, NBT-NS and MDNS, and act as a WPAD rogue server. +- Integrated [Responder](https://github.com/SpiderLabs/Responder) to poison LLMNR, NBT-NS and MDNS and act as a rogue WPAD server - Integrated [SSLstrip+](https://github.com/LeonardoNve/sslstrip2) by Leonardo Nve to partially bypass HSTS as demonstrated at BlackHat Asia 2014 -- ```Spoof``` plugin can now exploit the 'ShellShock' bug when DHCP spoofing! +- ```Spoof``` plugin can now exploit the 'ShellShock' bug when DHCP spoofing - ```Spoof``` plugin now supports ICMP, ARP and DHCP spoofing -- Usage of third party tools has been completely removed (e.g. ettercap) +- Usage of third party tools has been completely removed (e.g. Ettercap) - ```FilePwn```plugin re-written to backdoor executables zip and tar files on the fly by using [the-backdoor-factory](https://github.com/secretsquirrel/the-backdoor-factory) and code from [BDFProxy](https://github.com/secretsquirrel/BDFProxy) -- Added [msfrpc.py](https://github.com/byt3bl33d3r/msfrpc/blob/master/python-msfrpc/msfrpc.py) for interfacing with Metasploits rpc server +- Added [msfrpc.py](https://github.com/byt3bl33d3r/msfrpc/blob/master/python-msfrpc/msfrpc.py) for interfacing with Metasploit's RPC server - Added [beefapi.py](https://github.com/byt3bl33d3r/beefapi) for interfacing with BeEF's RESTfulAPI -- Addition of the app-cache poisoning attack by [Krzysztof Kotowicz](https://github.com/koto/sslstrip) (blogpost explaining the attack here http://blog.kotowicz.net/2010/12/squid-imposter-phishing-websites.html) +- Addition of the app-cache poisoning attack by [Krzysztof Kotowicz](https://github.com/koto/sslstrip) (blogpost explaining the attack here: http://blog.kotowicz.net/2010/12/squid-imposter-phishing-websites.html) How to install on Kali ====================== ```apt-get install mitmf``` -**Currently Kali has a very old version of MITMf in it's repos, read the [Installation](#installation) section to get the latest version** +**Currently Kali has a very old version of MITMf in its repos, read the [Installation](#installation) section to get the latest version** Installation ============ -If MITMf is not in your distros repo or you just want the latest version: -- Clone this repository +If MITMf is not in your distro's repo or you just want the latest version: +- Run the command ```git clone https://github.com/byt3bl33d3r/MITMf.git``` to clone this directory - Run the ```setup.sh``` script -- Run the command ```pip install --upgrade -r requirements.txt``` to install all python dependencies +- Run the command ```pip install --upgrade -r requirements.txt``` to install all Python dependencies -On Kali Linux, if you get an error while installing the ```pypcap``` package or when starting MITMf you see: ```ImportError: no module named pcap``` run ```apt-get install python-pypcap``` to fix it. +On Kali Linux, if you get an error while installing the ```pypcap``` package or when starting MITMf you see: ```ImportError: no module named pcap```, run ```apt-get install python-pypcap``` to fix it Submitting Issues ================= @@ -91,13 +91,13 @@ If you have *questions* regarding the framework please email me at byt3bl33d3r@g **Only submit issues if you find a bug in the latest version of the framework.** -When inevitably you do come across sed *bug*, please open an issue and include at least the following in the description: +When inevitably you do come across said *bug*, please open an issue and include at least the following in the description: - Full command string you used -- OS your using -- Full error traceback (If any) +- OS you're using +- Full error traceback, if any -Also remember: Github markdown is your friend! +Also, remember that Github markdown is your friend! FAQ === @@ -105,10 +105,10 @@ FAQ - No - **Is OSX supported?** -- Currently no, although with some tweaking (which I'll probably get around to in the near future) it should be able to run perfectly on OSX +- Currently no, although with some tweaking (which I'll probably get around to in the near future), it should be able to run perfectly on OSX. - **I can't install package X because of an error!** -- Try installing the package via ```pip``` or your distros package manager. This *isn't* a problem with MITMf. +- Try installing the package via ```pip``` or your distro's package manager. This *isn't* a problem with MITMf. - **How do I install package X?** - Please read the [installation](#installation) guide. @@ -117,4 +117,4 @@ FAQ - Please read the [installation](#installation) guide. - **Dude, no documentation/video tutorials?** -- Currently no, once the framework hits 1.0 I'll probably start writing/making some. +- Currently no but once the framework hits 1.0, I'll probably start writing/making some.