mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-31 12:10:20 -07:00
fixes #158
This commit is contained in:
parent
1a5c7c03b7
commit
d535c8796c
2 changed files with 7 additions and 4 deletions
|
@ -444,7 +444,7 @@
|
||||||
[[[[WindowsIntelx86]]]]
|
[[[[WindowsIntelx86]]]]
|
||||||
PATCH_TYPE = APPEND #JUMP/SINGLE/APPEND
|
PATCH_TYPE = APPEND #JUMP/SINGLE/APPEND
|
||||||
# PATCH_METHOD overwrites PATCH_TYPE, use automatic, replace, or onionduke
|
# PATCH_METHOD overwrites PATCH_TYPE, use automatic, replace, or onionduke
|
||||||
PATCH_METHOD =
|
PATCH_METHOD = automatic
|
||||||
HOST = 192.168.1.16
|
HOST = 192.168.1.16
|
||||||
PORT = 8090
|
PORT = 8090
|
||||||
# SHELL for use with automatic PATCH_METHOD
|
# SHELL for use with automatic PATCH_METHOD
|
||||||
|
@ -455,7 +455,7 @@
|
||||||
# PATCH_DLLs as they come across
|
# PATCH_DLLs as they come across
|
||||||
PATCH_DLL = False
|
PATCH_DLL = False
|
||||||
# RUNAS_ADMIN will attempt to patch requestedExecutionLevel as highestAvailable
|
# RUNAS_ADMIN will attempt to patch requestedExecutionLevel as highestAvailable
|
||||||
RUNAS_ADMIN = True
|
RUNAS_ADMIN = False
|
||||||
# XP_MODE - to support XP targets
|
# XP_MODE - to support XP targets
|
||||||
XP_MODE = True
|
XP_MODE = True
|
||||||
# SUPPLIED_BINARY is for use with PATCH_METHOD 'onionduke' DLL/EXE can be x64 and
|
# SUPPLIED_BINARY is for use with PATCH_METHOD 'onionduke' DLL/EXE can be x64 and
|
||||||
|
@ -476,7 +476,7 @@
|
||||||
ZERO_CERT = True
|
ZERO_CERT = True
|
||||||
PATCH_DLL = True
|
PATCH_DLL = True
|
||||||
# RUNAS_ADMIN will attempt to patch requestedExecutionLevel as highestAvailable
|
# RUNAS_ADMIN will attempt to patch requestedExecutionLevel as highestAvailable
|
||||||
RUNAS_ADMIN = True
|
RUNAS_ADMIN = False
|
||||||
# SUPPLIED_BINARY is for use with PATCH_METHOD onionduke DLL/EXE can x86 32bit and
|
# SUPPLIED_BINARY is for use with PATCH_METHOD onionduke DLL/EXE can x86 32bit and
|
||||||
# with PATCH_METHOD 'replace' use an EXE not DLL
|
# with PATCH_METHOD 'replace' use an EXE not DLL
|
||||||
SUPPLIED_BINARY = pentest_x64_payload.exe
|
SUPPLIED_BINARY = pentest_x64_payload.exe
|
||||||
|
|
|
@ -46,7 +46,10 @@ class NetCreds:
|
||||||
version = "1.0"
|
version = "1.0"
|
||||||
|
|
||||||
def sniffer(self, interface, ip):
|
def sniffer(self, interface, ip):
|
||||||
sniff(iface=interface, prn=pkt_parser, filter="not host {}".format(ip), store=0)
|
try:
|
||||||
|
sniff(iface=interface, prn=pkt_parser, filter="not host {}".format(ip), store=0)
|
||||||
|
except Exception as e:
|
||||||
|
if "Interrupted system call" in e: pass
|
||||||
|
|
||||||
def start(self, interface, ip, pcap):
|
def start(self, interface, ip, pcap):
|
||||||
if pcap:
|
if pcap:
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue