mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-05 20:42:20 -07:00
I've re-written a decent amount of the framework to support dynamic config file updates, revamped the ARP Spoofing 'engine' and changed the way MITMf integrates Responder and Netcreds. - Net-creds is now started by default and no longer a plugin.. It's all about getting those creds after all. - Integrated the Subterfuge Framework's ARPWatch script, it will enable itself when spoofing the whole subnet (also squashed bugs in the original ARP spoofing code) - The spoof plugin now supports specifying a range of targets (e.g. --target 10.10.10.1-15) and multiple targets (e.g. --target 10.10.10.1,10.10.10.2) - An SMB Server is now started by default, MITMf now uses Impacket's SMBserver as supposed to the one built into Responder, mainly for 2 reasons: 1) Impacket is moving towards SMB2 support and is actively developed 2) Impacket's SMB server is fully functional as supposed to Responder's (will be adding a section for it in the config file) 3) Responder's SMB server was unrealiable when used through MITMf (After spending a day trying to figure out why, I just gave up and yanked it out) - Responder's code has been broken down into single importable classes (way easier to manage and read, ugh!) - Started adding dynamic config support to Responder's code and changed the logging messages to be a bit more readable. - POST data captured through the proxy will now only be logged and printed to STDOUT when it's decodable to UTF-8 (this prevents logging encrypted data which is no use) - Responder and the Beefapi script are no longer submodules (they seem to be a pain to package, so i removed them to help a brother out) - Some plugins are missing because I'm currently re-writing them, will be added later - Main plugin class now inharates from the ConfigWatcher class, this way plugins will support dynamic configs natively! \o/
102 lines
No EOL
2.4 KiB
Python
102 lines
No EOL
2.4 KiB
Python
#common functions that are used throughout the Responder's code
|
|
|
|
|
|
import re
|
|
|
|
#Function used to write captured hashs to a file.
|
|
def WriteData(outfile, data, user):
|
|
if os.path.isfile(outfile) == False:
|
|
with open(outfile,"w") as outf:
|
|
outf.write(data)
|
|
outf.write("\n")
|
|
outf.close()
|
|
if os.path.isfile(outfile) == True:
|
|
with open(outfile,"r") as filestr:
|
|
if re.search(user.encode('hex'), filestr.read().encode('hex')):
|
|
filestr.close()
|
|
return False
|
|
if re.search(re.escape("$"), user):
|
|
filestr.close()
|
|
return False
|
|
else:
|
|
with open(outfile,"a") as outf2:
|
|
outf2.write(data)
|
|
outf2.write("\n")
|
|
outf2.close()
|
|
|
|
def Parse_IPV6_Addr(data):
|
|
if data[len(data)-4:len(data)][1] =="\x1c":
|
|
return False
|
|
if data[len(data)-4:len(data)] == "\x00\x01\x00\x01":
|
|
return True
|
|
if data[len(data)-4:len(data)] == "\x00\xff\x00\x01":
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
#Function name self-explanatory
|
|
def Is_Finger_On(Finger_On_Off):
|
|
if Finger_On_Off == True:
|
|
return True
|
|
if Finger_On_Off == False:
|
|
return False
|
|
|
|
def RespondToSpecificHost(RespondTo):
|
|
if len(RespondTo)>=1 and RespondTo != ['']:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def RespondToSpecificName(RespondToName):
|
|
if len(RespondToName)>=1 and RespondToName != ['']:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def RespondToIPScope(RespondTo, ClientIp):
|
|
if ClientIp in RespondTo:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def RespondToNameScope(RespondToName, Name):
|
|
if Name in RespondToName:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
##Dont Respond to these hosts/names.
|
|
def DontRespondToSpecificHost(DontRespondTo):
|
|
if len(DontRespondTo)>=1 and DontRespondTo != ['']:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def DontRespondToSpecificName(DontRespondToName):
|
|
if len(DontRespondToName)>=1 and DontRespondToName != ['']:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def DontRespondToIPScope(DontRespondTo, ClientIp):
|
|
if ClientIp in DontRespondTo:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def DontRespondToNameScope(DontRespondToName, Name):
|
|
if Name in DontRespondToName:
|
|
return True
|
|
else:
|
|
return False
|
|
|
|
def IsOnTheSameSubnet(ip, net):
|
|
net = net+'/24'
|
|
ipaddr = int(''.join([ '%02x' % int(x) for x in ip.split('.') ]), 16)
|
|
netstr, bits = net.split('/')
|
|
netaddr = int(''.join([ '%02x' % int(x) for x in netstr.split('.') ]), 16)
|
|
mask = (0xffffffff << (32 - int(bits))) & 0xffffffff
|
|
return (ipaddr & mask) == (netaddr & mask)
|
|
|
|
def FindLocalIP(Iface):
|
|
return OURIP |