MITMf V0.9.7 ============ Framework for Man-In-The-Middle attacks Quick tutorials, examples and dev updates at http://sign0f4.blogspot.it This tool is based on [sergio-proxy](https://github.com/supernothing/sergio-proxy) and is an attempt to revive and update the project. Contact me at: - Twitter: @byt3bl33d3r - IRC on Freenode: #MITMf - Email: byt3bl33d3r@gmail.com **Before submitting issues please read the [FAQ](#faq) and the appropriate [section](#submitting-issues).** Available plugins ================= - ```Responder``` - LLMNR, NBT-NS, WPAD and MDNS poisoner - ```SSLstrip+``` - Partially bypass HSTS - ```Spoof``` - Redirect traffic using ARP Spoofing, ICMP Redirects or DHCP Spoofing - ```BeEFAutorun``` - Autoruns BeEF modules based on clients OS or browser type - ```AppCachePoison``` - Perform App cache poisoning attacks - ```Ferret-NG``` - Transparently hijacks sessions - ```BrowserProfiler``` - Attempts to enumerate all browser plugins of connected clients - ```CacheKill``` - Kills page caching by modifying headers - ```FilePwn``` - Backdoor executables being sent over HTTP using the Backdoor Factory and BDFProxy - ```Inject``` - Inject arbitrary content into HTML content - ```BrowserPwn``` - Performs drive-by attacks on clients with out-of-date browser plugins - ```jskeylogger``` - Injects a javascript keylogger into clients webpages - ```Replace``` - Replace arbitary content in HTML content - ```SMBAuth``` - Evoke SMB challenge-response auth attempts - ```Upsidedownternet``` - Flips images 180 degrees Changelog ========= - Addition of a fully functional SMB server using the [Impacket](https://github.com/CoreSecurity/impacket) library - Addition of [DNSChef](https://github.com/iphelix/dnschef), the framework is now a IPv4/IPv6 (TCP & UDP) DNS server ! Supported queries are: 'A', 'AAAA', 'MX', 'PTR', 'NS', 'CNAME', 'TXT', 'SOA', 'NAPTR', 'SRV', 'DNSKEY' and 'RRSIG' - Integrated [Net-Creds](https://github.com/DanMcInerney/net-creds) currently supported protocols are: FTP, IRC, POP, IMAP, Telnet, SMTP, SNMP (community strings), NTLMv1/v2 (all supported protocols like HTTP, SMB, LDAP etc..) and Kerberos - Integrated [Responder](https://github.com/SpiderLabs/Responder) to poison LLMNR, NBT-NS and MDNS, and act as a WPAD rogue server. - Integrated [SSLstrip+](https://github.com/LeonardoNve/sslstrip2) by Leonardo Nve to partially bypass HSTS as demonstrated at BlackHat Asia 2014 - Addition of the ```Ferret-NG``` plugin, which uses code from [FireLamb](https://github.com/sensepost/mana/tree/master/firelamb) to store cookies in a Firefox profile - ```Spoof``` plugin can now exploit the 'ShellShock' bug when DHCP spoofing! - ```Spoof``` plugin now supports ICMP, ARP and DHCP spoofing - Usage of third party tools has been completely removed (e.g. ettercap) - ```FilePwn```plugin re-written to backdoor executables zip and tar files on the fly by using [the-backdoor-factory](https://github.com/secretsquirrel/the-backdoor-factory) and code from [BDFProxy](https://github.com/secretsquirrel/BDFProxy) - Added [msfrpc.py](https://github.com/byt3bl33d3r/msfrpc/blob/master/python-msfrpc/msfrpc.py) for interfacing with Metasploits rpc server - Added [beefapi.py](https://github.com/byt3bl33d3r/beefapi) for interfacing with BeEF's RESTfulAPI - Addition of the app-cache poisoning attack by [Krzysztof Kotowicz](https://github.com/koto/sslstrip) (blogpost explaining the attack here http://blog.kotowicz.net/2010/12/squid-imposter-phishing-websites.html) How to install on Kali ====================== ```apt-get install mitmf``` **Currently Kali has a very old version of MITMf in it's repos, read the [Installation](#installation) section to get the latest version** Installation ============ If MITMf is not in your distros repo or you just want the latest version: - Clone this repository - Run the ```setup.sh``` script - Run the command ```pip install -r requirements.txt``` to install all python dependencies On Kali Linux, if you get an error while installing the ```pypcap``` package or when starting MITMf you see: ```ImportError: no module named pcap``` run ```apt-get install python-pypcap``` to fix it. Submitting Issues ================= If you have *questions* regarding the framework please email me at byt3bl33d3r@gmail.com **Only submit issues if you find a bug in the latest version of the framework.** When inevitably you do come across sed *bug*, please open an issue and include at least the following in the description: - Full command string you used - OS your using - Full error traceback (If any) Also remember: Github markdown is your friend! FAQ === - **Is Windows supported?** - No - **Is OSX supported?** - Currently no, although with some tweaking (which I'll probably get around to in the near future) it should be able to run perfectly on OSX - **I can't install package X because of an error!** - Try installing the package via ```pip``` or your distros package manager. This *isn't* a problem with MITMf. - **How do I install package X?** - Please read the [installation](#installation) guide. - **I get an ImportError when launching MITMf!** - Please read the [installation](#installation) guide. - **Dude, no documentation/video tutorials?** - Currently no, once the framework hits 1.0 I'll probably start writing/making some.