mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-07 21:42:17 -07:00
updated Readme, added finish() to SJ plugin
This commit is contained in:
parent
c44d53ca48
commit
78dcfc0383
4 changed files with 12 additions and 10 deletions
|
@ -1,4 +1,4 @@
|
||||||
MITMf V0.7
|
MITMf V0.8
|
||||||
==========
|
==========
|
||||||
|
|
||||||
Framework for Man-In-The-Middle attacks
|
Framework for Man-In-The-Middle attacks
|
||||||
|
@ -12,6 +12,7 @@ Availible plugins:
|
||||||
- BeEFAutorun - Autoruns BeEF modules based on clients OS or browser type
|
- BeEFAutorun - Autoruns BeEF modules based on clients OS or browser type
|
||||||
- AppCachePoison - Perform app cache poison attacks
|
- AppCachePoison - Perform app cache poison attacks
|
||||||
- AirPwn - Monitor traffic on an 802.11 network and respond with arbitrary content as configured
|
- AirPwn - Monitor traffic on an 802.11 network and respond with arbitrary content as configured
|
||||||
|
- SessionHijacking - Performs sessions hijacking attacks, and stores cookies in a firefox profile
|
||||||
- BrowserProfiler - Attempts to enumerate all browser plugins of connected clients
|
- BrowserProfiler - Attempts to enumerate all browser plugins of connected clients
|
||||||
- CacheKill - Kills page caching by modifying headers
|
- CacheKill - Kills page caching by modifying headers
|
||||||
- FilePwn - Backdoor executables being sent over http using bdfactory
|
- FilePwn - Backdoor executables being sent over http using bdfactory
|
||||||
|
@ -28,6 +29,8 @@ So far the most significant changes have been:
|
||||||
|
|
||||||
- Addition of the AirPwn plugin (Python port of the original project), which also supports the DNSpwn attack
|
- Addition of the AirPwn plugin (Python port of the original project), which also supports the DNSpwn attack
|
||||||
|
|
||||||
|
- Addition of the SessionHijacking plugin, which uses code from FireLamb (https://github.com/sensepost/mana/tree/master/firelamb) to store cookies in a Firefox profile
|
||||||
|
|
||||||
- Spoof plugin now supports ICMP, ARP and DHCP spoofing along with DNS tampering
|
- Spoof plugin now supports ICMP, ARP and DHCP spoofing along with DNS tampering
|
||||||
(DNS tampering code was stolen from https://github.com/DanMcInerney/dnsspoof/)
|
(DNS tampering code was stolen from https://github.com/DanMcInerney/dnsspoof/)
|
||||||
|
|
||||||
|
|
2
mitmf.py
2
mitmf.py
|
@ -13,7 +13,7 @@ import argparse
|
||||||
from plugins import *
|
from plugins import *
|
||||||
plugin_classes = plugin.Plugin.__subclasses__()
|
plugin_classes = plugin.Plugin.__subclasses__()
|
||||||
|
|
||||||
mitmf_version = "0.7"
|
mitmf_version = "0.8"
|
||||||
sslstrip_version = "0.9"
|
sslstrip_version = "0.9"
|
||||||
sergio_version = "0.2.1"
|
sergio_version = "0.2.1"
|
||||||
|
|
||||||
|
|
|
@ -1,8 +1,6 @@
|
||||||
#Almost all of the Firefox related code was stolen from Glenn's Firelamb.
|
#Almost all of the Firefox related code was stolen from Firelamb https://github.com/sensepost/mana/tree/master/firelamb
|
||||||
#glenn@sensepost.com
|
|
||||||
|
|
||||||
from plugins.plugin import Plugin
|
from plugins.plugin import Plugin
|
||||||
from sslstrip.URLMonitor import URLMonitor
|
|
||||||
from libs.publicsuffix import PublicSuffixList
|
from libs.publicsuffix import PublicSuffixList
|
||||||
from urlparse import urlparse
|
from urlparse import urlparse
|
||||||
import os
|
import os
|
||||||
|
@ -10,7 +8,7 @@ import sys
|
||||||
import time
|
import time
|
||||||
import logging
|
import logging
|
||||||
import sqlite3
|
import sqlite3
|
||||||
import threading
|
#import threading
|
||||||
|
|
||||||
class SessionHijacker(Plugin):
|
class SessionHijacker(Plugin):
|
||||||
name = "Session Hijacker"
|
name = "Session Hijacker"
|
||||||
|
@ -22,8 +20,6 @@ class SessionHijacker(Plugin):
|
||||||
def initialize(self, options):
|
def initialize(self, options):
|
||||||
'''Called if plugin is enabled, passed the options namespace'''
|
'''Called if plugin is enabled, passed the options namespace'''
|
||||||
self.options = options
|
self.options = options
|
||||||
self.log_clients = options.clients
|
|
||||||
self.urlMonitor = URLMonitor.getInstance()
|
|
||||||
self.psl = PublicSuffixList()
|
self.psl = PublicSuffixList()
|
||||||
self.firefox = options.firefox
|
self.firefox = options.firefox
|
||||||
self.save_dir = "./logs"
|
self.save_dir = "./logs"
|
||||||
|
@ -122,3 +118,6 @@ class SessionHijacker(Plugin):
|
||||||
|
|
||||||
def add_options(self, options):
|
def add_options(self, options):
|
||||||
options.add_argument('--firefox', dest='firefox', action='store_true', default=False, help='Create a firefox profile with captured cookies')
|
options.add_argument('--firefox', dest='firefox', action='store_true', default=False, help='Create a firefox profile with captured cookies')
|
||||||
|
|
||||||
|
def finish(self):
|
||||||
|
print "[*] To load a session run: 'firefox -profile <client-ip> logs/<client-ip>'"
|
|
@ -54,7 +54,7 @@ class ServerConnection(HTTPClient):
|
||||||
|
|
||||||
def sendRequest(self):
|
def sendRequest(self):
|
||||||
if self.command == 'GET':
|
if self.command == 'GET':
|
||||||
logging.info("%s Sending Request: %s %s" % (self.client.getClientIP(), self.command, self.headers['host']))
|
logging.info("%s Sending Request: %s" % (self.client.getClientIP(), self.headers['host']))
|
||||||
self.plugins.hook()
|
self.plugins.hook()
|
||||||
self.sendCommand(self.command, self.uri)
|
self.sendCommand(self.command, self.uri)
|
||||||
|
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue