mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-08-14 02:37:06 -07:00
updated README
This commit is contained in:
parent
d01398d8a8
commit
7f333e506b
1 changed files with 3 additions and 1 deletions
|
@ -8,7 +8,7 @@ Quick tutorials, examples and dev updates at http://sign0f4.blogspot.it
|
|||
This tool is completely based on sergio-proxy https://code.google.com/p/sergio-proxy/ and is an attempt to revive and update the project.
|
||||
|
||||
Availible plugins:
|
||||
- Responder
|
||||
- Responder - LLMNR, NBT-NS and MDNS poisoner
|
||||
- Spoof - Redirect traffic using ARP Spoofing, ICMP Redirects or DHCP Spoofing and modify DNS queries
|
||||
- BeEFAutorun - Autoruns BeEF modules based on clients OS or browser type
|
||||
- AppCachePoison - Perform app cache poison attacks
|
||||
|
@ -26,6 +26,8 @@ Availible plugins:
|
|||
|
||||
So far the most significant changes have been:
|
||||
|
||||
- Integrated Responder (https://github.com/SpiderLabs/Responder) to poison LLMNR, NBT-NS and MDNS, and act as a WPAD rogue server.
|
||||
|
||||
- Integrated SSLstrip+ (https://github.com/LeonardoNve/sslstrip2) by Leonardo Nve to partially bypass HSTS as demonstrated at BlackHat Asia 2014
|
||||
|
||||
- Addition of the AirPwn plugin (Python port of the original project), which also supports the DNSpwn attack
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue