mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-08-14 02:37:06 -07:00
version bump
This commit is contained in:
parent
fcdbe49df9
commit
caaee53079
7 changed files with 12 additions and 37 deletions
|
@ -45,6 +45,7 @@ class BeefAutorun(Inject, Plugin):
|
|||
if not beef.login(beefconfig['user'], beefconfig['pass']):
|
||||
sys.exit("[-] Error logging in to BeEF!")
|
||||
|
||||
print "| |_ Mode: %s" % self.Mode
|
||||
t = threading.Thread(name="autorun", target=self.autorun, args=(beef,))
|
||||
t.setDaemon(True)
|
||||
t.start()
|
||||
|
|
|
@ -50,7 +50,7 @@ class JavaPwn(BrowserProfiler, Plugin):
|
|||
msf = msfrpc.Msfrpc({"host": self.rpcip}) #create an instance of msfrpc libarary
|
||||
msf.login('msf', self.rpcpass)
|
||||
version = msf.call('core.version')['version']
|
||||
print "[*] Successfully connected to Metasploit v%s" % version
|
||||
print "| |_ Connected to Metasploit v%s" % version
|
||||
except Exception:
|
||||
sys.exit("[-] Error connecting to MSF! Make sure you started Metasploit and its MSGRPC server")
|
||||
|
||||
|
|
|
@ -24,7 +24,6 @@ class Responder(Plugin):
|
|||
except Exception, e:
|
||||
sys.exit('[-] Error parsing config for Responder: ' + str(e))
|
||||
|
||||
print "[*] Responder plugin online"
|
||||
DnsCache.getInstance().setCustomAddress(self.ip_address)
|
||||
|
||||
for name in ['wpad', 'ISAProxySrv', 'RespProxySrv']:
|
||||
|
|
|
@ -1,7 +1,3 @@
|
|||
#
|
||||
# DNS tampering code stolen from https://github.com/DanMcInerney/dnsspoof
|
||||
#
|
||||
|
||||
from plugins.plugin import Plugin
|
||||
from time import sleep
|
||||
import dns.resolver
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue