Merge pull request #104 from DrDinosaur/patch-1

Cleaned up readme
This commit is contained in:
byt3bl33d3r 2015-06-01 00:56:54 +02:00
commit e1bf7c642a

View file

@ -3,7 +3,7 @@ MITMf V0.9.7
Framework for Man-In-The-Middle attacks
Quick tutorials, examples and dev updates at http://sign0f4.blogspot.it
Quick tutorials, examples and developer updates at: http://sign0f4.blogspot.it
This tool is based on [sergio-proxy](https://github.com/supernothing/sergio-proxy) and is an attempt to revive and update the project.
@ -12,25 +12,25 @@ Contact me at:
- IRC on Freenode: #MITMf
- Email: byt3bl33d3r@gmail.com
**Before submitting issues please read the [FAQ](#faq) and the appropriate [section](#submitting-issues).**
**Before submitting issues, please read the [FAQ](#faq) and the appropriate [section](#submitting-issues).**
Available plugins
=================
- ```Screenshotter``` - Uses HTML5 Canvas to render an accurate screenshot of a clients browser
- ```Screenshotter``` - Uses HTML5 Canvas to render an accurate screenshot of a client's browser
- ```Responder``` - LLMNR, NBT-NS, WPAD and MDNS poisoner
- ```SSLstrip+``` - Partially bypass HSTS
- ```Spoof``` - Redirect traffic using ARP Spoofing, ICMP Redirects or DHCP Spoofing
- ```BeEFAutorun``` - Autoruns BeEF modules based on clients OS or browser type
- ```AppCachePoison``` - Perform App cache poisoning attacks
- ```Spoof``` - Redirect traffic using ARP spoofing, ICMP redirects or DHCP spoofing
- ```BeEFAutorun``` - Autoruns BeEF modules based on a client's OS or browser type
- ```AppCachePoison``` - Perform app cache poisoning attacks
- ```Ferret-NG``` - Transperently hijacks sessions
- ```BrowserProfiler``` - Attempts to enumerate all browser plugins of connected clients
- ```CacheKill``` - Kills page caching by modifying headers
- ```FilePwn``` - Backdoor executables being sent over HTTP using the Backdoor Factory and BDFProxy
- ```FilePwn``` - Backdoor executables sent over HTTP using the Backdoor Factory and BDFProxy
- ```Inject``` - Inject arbitrary content into HTML content
- ```BrowserSniper``` - Performs drive-by attacks on clients with out-of-date browser plugins
- ```jskeylogger``` - Injects a javascript keylogger into clients webpages
- ```jskeylogger``` - Injects a Javascript keylogger into a client's webpages
- ```Replace``` - Replace arbitary content in HTML content
- ```SMBAuth``` - Evoke SMB challenge-response auth attempts
- ```SMBAuth``` - Evoke SMB challenge-response authentication attempts
- ```Upsidedownternet``` - Flips images 180 degrees
Changelog
@ -40,50 +40,50 @@ Changelog
- ```SessionHijacker``` is replaced with ```Ferret-NG```, captures cookies and starts a proxy that will feed them to connected clients
- ```JavaPwn``` plugin replced with ```BrowserSniper```, now supports java, flash and browser exploits
- ```JavaPwn``` plugin replced with ```BrowserSniper```, now supports Java, Flash and browser exploits
- Addition of the ```Screenshotter``` plugin, able to render screenshots of a clients browser at regular intervals
- Addition of the ```Screenshotter``` plugin, able to render screenshots of a client's browser at regular intervals
- Addition of a fully functional SMB server using the [Impacket](https://github.com/CoreSecurity/impacket) library
- Addition of [DNSChef](https://github.com/iphelix/dnschef), the framework is now a IPv4/IPv6 (TCP & UDP) DNS server ! Supported queries are: 'A', 'AAAA', 'MX', 'PTR', 'NS', 'CNAME', 'TXT', 'SOA', 'NAPTR', 'SRV', 'DNSKEY' and 'RRSIG'
- Addition of [DNSChef](https://github.com/iphelix/dnschef), the framework is now a IPv4/IPv6 (TCP & UDP) DNS server! Supported queries are: 'A', 'AAAA', 'MX', 'PTR', 'NS', 'CNAME', 'TXT', 'SOA', 'NAPTR', 'SRV', 'DNSKEY' and 'RRSIG'
- Integrated [Net-Creds](https://github.com/DanMcInerney/net-creds) currently supported protocols are:
FTP, IRC, POP, IMAP, Telnet, SMTP, SNMP (community strings), NTLMv1/v2 (all supported protocols like HTTP, SMB, LDAP etc..) and Kerberos
FTP, IRC, POP, IMAP, Telnet, SMTP, SNMP (community strings), NTLMv1/v2 (all supported protocols like HTTP, SMB, LDAP etc.) and Kerberos
- Integrated [Responder](https://github.com/SpiderLabs/Responder) to poison LLMNR, NBT-NS and MDNS, and act as a WPAD rogue server.
- Integrated [Responder](https://github.com/SpiderLabs/Responder) to poison LLMNR, NBT-NS and MDNS and act as a rogue WPAD server
- Integrated [SSLstrip+](https://github.com/LeonardoNve/sslstrip2) by Leonardo Nve to partially bypass HSTS as demonstrated at BlackHat Asia 2014
- ```Spoof``` plugin can now exploit the 'ShellShock' bug when DHCP spoofing!
- ```Spoof``` plugin can now exploit the 'ShellShock' bug when DHCP spoofing
- ```Spoof``` plugin now supports ICMP, ARP and DHCP spoofing
- Usage of third party tools has been completely removed (e.g. ettercap)
- Usage of third party tools has been completely removed (e.g. Ettercap)
- ```FilePwn```plugin re-written to backdoor executables zip and tar files on the fly by using [the-backdoor-factory](https://github.com/secretsquirrel/the-backdoor-factory) and code from [BDFProxy](https://github.com/secretsquirrel/BDFProxy)
- Added [msfrpc.py](https://github.com/byt3bl33d3r/msfrpc/blob/master/python-msfrpc/msfrpc.py) for interfacing with Metasploits rpc server
- Added [msfrpc.py](https://github.com/byt3bl33d3r/msfrpc/blob/master/python-msfrpc/msfrpc.py) for interfacing with Metasploit's RPC server
- Added [beefapi.py](https://github.com/byt3bl33d3r/beefapi) for interfacing with BeEF's RESTfulAPI
- Addition of the app-cache poisoning attack by [Krzysztof Kotowicz](https://github.com/koto/sslstrip) (blogpost explaining the attack here http://blog.kotowicz.net/2010/12/squid-imposter-phishing-websites.html)
- Addition of the app-cache poisoning attack by [Krzysztof Kotowicz](https://github.com/koto/sslstrip) (blogpost explaining the attack here: http://blog.kotowicz.net/2010/12/squid-imposter-phishing-websites.html)
How to install on Kali
======================
```apt-get install mitmf```
**Currently Kali has a very old version of MITMf in it's repos, read the [Installation](#installation) section to get the latest version**
**Currently Kali has a very old version of MITMf in its repos, read the [Installation](#installation) section to get the latest version**
Installation
============
If MITMf is not in your distros repo or you just want the latest version:
- Clone this repository
If MITMf is not in your distro's repo or you just want the latest version:
- Run the command ```git clone https://github.com/byt3bl33d3r/MITMf.git``` to clone this directory
- Run the ```setup.sh``` script
- Run the command ```pip install --upgrade -r requirements.txt``` to install all python dependencies
- Run the command ```pip install --upgrade -r requirements.txt``` to install all Python dependencies
On Kali Linux, if you get an error while installing the ```pypcap``` package or when starting MITMf you see: ```ImportError: no module named pcap``` run ```apt-get install python-pypcap``` to fix it.
On Kali Linux, if you get an error while installing the ```pypcap``` package or when starting MITMf you see: ```ImportError: no module named pcap```, run ```apt-get install python-pypcap``` to fix it
Submitting Issues
=================
@ -91,13 +91,13 @@ If you have *questions* regarding the framework please email me at byt3bl33d3r@g
**Only submit issues if you find a bug in the latest version of the framework.**
When inevitably you do come across sed *bug*, please open an issue and include at least the following in the description:
When inevitably you do come across said *bug*, please open an issue and include at least the following in the description:
- Full command string you used
- OS your using
- Full error traceback (If any)
- OS you're using
- Full error traceback, if any
Also remember: Github markdown is your friend!
Also, remember that Github markdown is your friend!
FAQ
===
@ -105,10 +105,10 @@ FAQ
- No
- **Is OSX supported?**
- Currently no, although with some tweaking (which I'll probably get around to in the near future) it should be able to run perfectly on OSX
- Currently no, although with some tweaking (which I'll probably get around to in the near future), it should be able to run perfectly on OSX.
- **I can't install package X because of an error!**
- Try installing the package via ```pip``` or your distros package manager. This *isn't* a problem with MITMf.
- Try installing the package via ```pip``` or your distro's package manager. This *isn't* a problem with MITMf.
- **How do I install package X?**
- Please read the [installation](#installation) guide.
@ -117,4 +117,4 @@ FAQ
- Please read the [installation](#installation) guide.
- **Dude, no documentation/video tutorials?**
- Currently no, once the framework hits 1.0 I'll probably start writing/making some.
- Currently no but once the framework hits 1.0, I'll probably start writing/making some.