mirror of
https://github.com/byt3bl33d3r/MITMf.git
synced 2025-07-05 20:42:20 -07:00
I've re-written a decent amount of the framework to support dynamic config file updates, revamped the ARP Spoofing 'engine' and changed the way MITMf integrates Responder and Netcreds. - Net-creds is now started by default and no longer a plugin.. It's all about getting those creds after all. - Integrated the Subterfuge Framework's ARPWatch script, it will enable itself when spoofing the whole subnet (also squashed bugs in the original ARP spoofing code) - The spoof plugin now supports specifying a range of targets (e.g. --target 10.10.10.1-15) and multiple targets (e.g. --target 10.10.10.1,10.10.10.2) - An SMB Server is now started by default, MITMf now uses Impacket's SMBserver as supposed to the one built into Responder, mainly for 2 reasons: 1) Impacket is moving towards SMB2 support and is actively developed 2) Impacket's SMB server is fully functional as supposed to Responder's (will be adding a section for it in the config file) 3) Responder's SMB server was unrealiable when used through MITMf (After spending a day trying to figure out why, I just gave up and yanked it out) - Responder's code has been broken down into single importable classes (way easier to manage and read, ugh!) - Started adding dynamic config support to Responder's code and changed the logging messages to be a bit more readable. - POST data captured through the proxy will now only be logged and printed to STDOUT when it's decodable to UTF-8 (this prevents logging encrypted data which is no use) - Responder and the Beefapi script are no longer submodules (they seem to be a pain to package, so i removed them to help a brother out) - Some plugins are missing because I'm currently re-writing them, will be added later - Main plugin class now inharates from the ConfigWatcher class, this way plugins will support dynamic configs natively! \o/
50 lines
1.4 KiB
Python
50 lines
1.4 KiB
Python
'''
|
|
The base plugin class. This shows the various methods that
|
|
can get called during the MITM attack.
|
|
'''
|
|
from core.configwatcher import ConfigWatcher
|
|
import logging
|
|
|
|
mitmf_logger = logging.getLogger('mitmf')
|
|
|
|
class Plugin(ConfigWatcher, object):
|
|
name = "Generic plugin"
|
|
optname = "generic"
|
|
desc = ""
|
|
implements = []
|
|
has_opts = False
|
|
|
|
def initialize(self, options):
|
|
'''Called if plugin is enabled, passed the options namespace'''
|
|
self.options = options
|
|
|
|
def startThread(self, options):
|
|
'''Anything that will subclass this function will be a thread'''
|
|
return
|
|
|
|
def add_options(options):
|
|
'''Add your options to the options parser'''
|
|
raise NotImplementedError
|
|
|
|
def handleHeader(self, request, key, value):
|
|
'''Handles all response headers'''
|
|
raise NotImplementedError
|
|
|
|
def connectionMade(self, request):
|
|
'''Handles outgoing request'''
|
|
raise NotImplementedError
|
|
|
|
def pluginReactor(self, strippingFactory):
|
|
'''This sets up another instance of the reactor on a diffrent port'''
|
|
pass
|
|
|
|
def handleResponse(self, request, data):
|
|
'''
|
|
Handles all non-image responses by default. See Upsidedownternet
|
|
for how to get images
|
|
'''
|
|
raise NotImplementedError
|
|
|
|
def finish(self):
|
|
'''This will be called when shutting down'''
|
|
pass
|