mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-06 21:12:16 -07:00
This is 1/2 of the work done... lot's of cool stuff!
I've re-written a decent amount of the framework to support dynamic config file updates, revamped the ARP Spoofing 'engine' and changed the way MITMf integrates Responder and Netcreds. - Net-creds is now started by default and no longer a plugin.. It's all about getting those creds after all. - Integrated the Subterfuge Framework's ARPWatch script, it will enable itself when spoofing the whole subnet (also squashed bugs in the original ARP spoofing code) - The spoof plugin now supports specifying a range of targets (e.g. --target 10.10.10.1-15) and multiple targets (e.g. --target 10.10.10.1,10.10.10.2) - An SMB Server is now started by default, MITMf now uses Impacket's SMBserver as supposed to the one built into Responder, mainly for 2 reasons: 1) Impacket is moving towards SMB2 support and is actively developed 2) Impacket's SMB server is fully functional as supposed to Responder's (will be adding a section for it in the config file) 3) Responder's SMB server was unrealiable when used through MITMf (After spending a day trying to figure out why, I just gave up and yanked it out) - Responder's code has been broken down into single importable classes (way easier to manage and read, ugh!) - Started adding dynamic config support to Responder's code and changed the logging messages to be a bit more readable. - POST data captured through the proxy will now only be logged and printed to STDOUT when it's decodable to UTF-8 (this prevents logging encrypted data which is no use) - Responder and the Beefapi script are no longer submodules (they seem to be a pain to package, so i removed them to help a brother out) - Some plugins are missing because I'm currently re-writing them, will be added later - Main plugin class now inharates from the ConfigWatcher class, this way plugins will support dynamic configs natively! \o/
This commit is contained in:
parent
663f38e732
commit
9712eed4a3
92 changed files with 6883 additions and 3349 deletions
|
@ -20,17 +20,66 @@
|
|||
#
|
||||
|
||||
import os
|
||||
import sys
|
||||
import random
|
||||
import logging
|
||||
import re
|
||||
import sys
|
||||
|
||||
logging.getLogger("scapy.runtime").setLevel(logging.ERROR) #Gets rid of IPV6 Error when importing scapy
|
||||
from scapy.all import get_if_addr, get_if_hwaddr
|
||||
|
||||
mitmf_logger = logging.getLogger('mitmf')
|
||||
|
||||
class ImportDir:
|
||||
#---------------------------------------------------------------------------------------------------
|
||||
# http://gitlab.com/aurelien-lourot/importdir
|
||||
#---------------------------------------------------------------------------------------------------
|
||||
|
||||
# File name of a module:
|
||||
__module_file_regexp = "(.+)\.py(c?)$"
|
||||
|
||||
#---------------------------------------------------------------------------------------------------
|
||||
# Interface
|
||||
#---------------------------------------------------------------------------------------------------
|
||||
|
||||
def do(self, path, env):
|
||||
""" Imports all modules residing directly in directory "path" into the provided environment
|
||||
(usually the callers environment). A typical call:
|
||||
importdir.do("example_dir", globals())
|
||||
"""
|
||||
self.__do(path, env)
|
||||
|
||||
|
||||
#---------------------------------------------------------------------------------------------------
|
||||
# Implementation
|
||||
#---------------------------------------------------------------------------------------------------
|
||||
|
||||
def get_module_names_in_dir(self, path):
|
||||
""" Returns a set of all module names residing directly in directory "path".
|
||||
"""
|
||||
result = set()
|
||||
|
||||
# Looks for all python files in the directory (not recursively) and add their name to result:
|
||||
for entry in os.listdir(path):
|
||||
if os.path.isfile(os.path.join(path, entry)):
|
||||
regexp_result = re.search(self.__module_file_regexp, entry)
|
||||
if regexp_result: # is a module file name
|
||||
result.add(regexp_result.groups()[0])
|
||||
|
||||
return result
|
||||
|
||||
def __do(self, path, env):
|
||||
""" Implements do().
|
||||
"""
|
||||
sys.path.append(path) # adds provided directory to list we can import from
|
||||
for module_name in sorted(self.get_module_names_in_dir(path)): # for each found module...
|
||||
env[module_name] = __import__(module_name) # ... import
|
||||
|
||||
class SystemConfig:
|
||||
|
||||
@staticmethod
|
||||
def setIpForwarding(value):
|
||||
mitmf_logger.debug("[Utils] Setting ip forwarding to {}".format(value))
|
||||
with open('/proc/sys/net/ipv4/ip_forward', 'w') as file:
|
||||
file.write(str(value))
|
||||
file.close()
|
||||
|
@ -40,11 +89,11 @@ class SystemConfig:
|
|||
try:
|
||||
ip_address = get_if_addr(interface)
|
||||
if (ip_address == "0.0.0.0") or (ip_address is None):
|
||||
sys.exit("[-] Interface {} does not have an assigned IP address".format(interface))
|
||||
exit("[Utils] Interface {} does not have an assigned IP address".format(interface))
|
||||
|
||||
return ip_address
|
||||
except Exception, e:
|
||||
sys.exit("[-] Error retrieving IP address from {}: {}".format(interface, e))
|
||||
exit("[Utils] Error retrieving IP address from {}: {}".format(interface, e))
|
||||
|
||||
@staticmethod
|
||||
def getMAC(interface):
|
||||
|
@ -52,7 +101,7 @@ class SystemConfig:
|
|||
mac_address = get_if_hwaddr(interface)
|
||||
return mac_address
|
||||
except Exception, e:
|
||||
sys.exit("[-] Error retrieving MAC address from {}: {}".format(interface, e))
|
||||
exit("[Utils] Error retrieving MAC address from {}: {}".format(interface, e))
|
||||
|
||||
class IpTables:
|
||||
|
||||
|
@ -70,15 +119,18 @@ class IpTables:
|
|||
return IpTables._instance
|
||||
|
||||
def Flush(self):
|
||||
mitmf_logger.debug("[Utils] Flushing iptables")
|
||||
os.system('iptables -F && iptables -X && iptables -t nat -F && iptables -t nat -X')
|
||||
self.dns = False
|
||||
self.http = False
|
||||
|
||||
def HTTP(self, http_redir_port):
|
||||
mitmf_logger.debug("[Utils] Setting iptables HTTP redirection rule from port 80 to {}".format(http_redir_port))
|
||||
os.system('iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port {}'.format(http_redir_port))
|
||||
self.http = True
|
||||
|
||||
def DNS(self, ip, port):
|
||||
mitmf_logger.debug("[Utils] Setting iptables DNS redirection rule from port 53 to {}:{}".format(ip, port))
|
||||
os.system('iptables -t nat -A PREROUTING -p udp --dport 53 -j DNAT --to {}:{}'.format(ip, port))
|
||||
self.dns = True
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue