Framework for Man-In-The-Middle attacks
Find a file
byt3bl33d3r ba14ed8687 This commit refactors ARP and DHCP poisoning:
DHCP poisoning now works on Windows, additionaly it's been optimized for performance improvements
ARP poisoning has been optimized with and internal cache and some algo improvements

cve-details-parser.py has been added to the utils/ directory to help adding exploits to the BrowserSniper config file

I'm currently working on adding to the filepwn plugin all of the missing options that bdfproxy stand-alone has
2015-07-25 02:49:41 +02:00
config This commit refactors ARP and DHCP poisoning: 2015-07-25 02:49:41 +02:00
core This commit refactors ARP and DHCP poisoning: 2015-07-25 02:49:41 +02:00
libs This is a vewwwy big commit 2015-07-18 20:14:07 +02:00
logs fixed .gitignore 2015-05-19 00:45:27 +02:00
plugins This commit refactors ARP and DHCP poisoning: 2015-07-25 02:49:41 +02:00
tools This commit refactors ARP and DHCP poisoning: 2015-07-25 02:49:41 +02:00
.gitignore updated requirements.txt, changed imports to mitmflib 2015-06-11 22:05:22 +02:00
.gitmodules This is 1/2 of the work done... lot's of cool stuff! 2015-04-27 18:33:55 +02:00
CONTRIBUTING.md This commit refactors ARP and DHCP poisoning: 2015-07-25 02:49:41 +02:00
kali_setup.sh added kali setup script and updated readme 2015-06-15 00:18:55 +02:00
LICENSE Initial commit 2014-07-07 13:13:51 +02:00
lock.ico initial commit 2014-07-07 13:40:49 +02:00
mitmf.py This commit refactors ARP and DHCP poisoning: 2015-07-25 02:49:41 +02:00
other_setup.sh Revamped logging , plugins will be re-added later once refactored 2015-07-14 17:40:19 +02:00
README.md This commit refactors ARP and DHCP poisoning: 2015-07-25 02:49:41 +02:00

#MITMf V0.9.8 - 'The Dark Side'

Framework for Man-In-The-Middle attacks

Quick tutorials, examples and developer updates at: https://byt3bl33d3r.github.io

This tool is based on sergio-proxy and is an attempt to revive and update the project.

Twitter: @byt3bl33d3r IRC on Freenode: #MITMf Email: byt3bl33d3r@gmail.com

Before submitting issues, please read the FAQ and CONTRIBIUTING.md.

Available plugins

  • HTA Drive-By - Injects a fake update notification and prompts clients to download an HTA application
  • SMBtrap - Exploits the 'SMB Trap' vulnerability on connected clients
  • Screenshotter - Uses HTML5 Canvas to render an accurate screenshot of a clients browser
  • Responder - LLMNR, NBT-NS, WPAD and MDNS poisoner
  • SSLstrip+ - Partially bypass HSTS
  • Spoof - Redirect traffic using ARP spoofing, ICMP redirects or DHCP spoofing
  • BeEFAutorun - Autoruns BeEF modules based on a client's OS or browser type
  • AppCachePoison - Perform app cache poisoning attacks
  • Ferret-NG - Transperently hijacks sessions
  • BrowserProfiler - Attempts to enumerate all browser plugins of connected clients
  • CacheKill - Kills page caching by modifying headers
  • FilePwn - Backdoor executables sent over HTTP using the Backdoor Factory and BDFProxy
  • Inject - Inject arbitrary content into HTML content
  • BrowserSniper - Performs drive-by attacks on clients with out-of-date browser plugins
  • jskeylogger - Injects a Javascript keylogger into a client's webpages
  • Replace - Replace arbitary content in HTML content
  • SMBAuth - Evoke SMB challenge-response authentication attempts
  • Upsidedownternet - Flips images 180 degrees

Changelog

  • Added the SMBTrap plugin

  • Config file now updates on the fly!

  • SessionHijacker is replaced with Ferret-NG, captures cookies and starts a proxy that will feed them to connected clients

  • JavaPwn plugin replced with BrowserSniper, now supports Java, Flash and browser exploits

  • Addition of the Screenshotter plugin, able to render screenshots of a client's browser at regular intervals

  • Addition of a fully functional SMB server using the Impacket library

  • Addition of DNSChef, the framework is now a IPv4/IPv6 (TCP & UDP) DNS server! Supported queries are: 'A', 'AAAA', 'MX', 'PTR', 'NS', 'CNAME', 'TXT', 'SOA', 'NAPTR', 'SRV', 'DNSKEY' and 'RRSIG'

  • Integrated Net-Creds currently supported protocols are: FTP, IRC, POP, IMAP, Telnet, SMTP, SNMP (community strings), NTLMv1/v2 (all supported protocols like HTTP, SMB, LDAP etc.) and Kerberos

  • Integrated Responder to poison LLMNR, NBT-NS and MDNS and act as a rogue WPAD server

  • Integrated SSLstrip+ by Leonardo Nve to partially bypass HSTS as demonstrated at BlackHat Asia 2014

  • Spoof plugin can now exploit the 'ShellShock' bug when DHCP spoofing

  • Spoof plugin now supports ICMP, ARP and DHCP spoofing

  • Usage of third party tools has been completely removed (e.g. Ettercap)

  • FilePwnplugin re-written to backdoor executables zip and tar files on the fly by using the-backdoor-factory and code from BDFProxy

  • Added msfrpc.py for interfacing with Metasploit's RPC server

  • Added beefapi.py for interfacing with BeEF's RESTfulAPI

  • Addition of the app-cache poisoning attack by Krzysztof Kotowicz (blogpost explaining the attack here: http://blog.kotowicz.net/2010/12/squid-imposter-phishing-websites.html)

How to install on Kali

apt-get install mitmf

Currently Kali has a very old version of MITMf in its repos, read the Installation section to get the latest version

Installation

If you're rocking Kali and want the latest version:

  • Clone this repository
  • Run the kali_setup.sh script Note: you can ignore any errors when pip tries to install dependencies, MITMf should be able to run anyway

If you're rocking any other Linux distro:

  • Clone this repository
  • Run the other_setup.sh script
  • Run the command pip install --upgrade mitmflib to install all Python dependencies

FAQ

  • Is Windows supported?

  • No, it will never be supported

  • Is OSX supported?

  • Yes! Initial compatibility has been introduced in 0.9.8! Find anything broken submit a PR or open an issue ticket!

  • I can't install package X because of an error!

  • Try installing the package via pip or your distro's package manager. This isn't a problem with MITMf.

  • How do I install package X?

  • Please read the installation guide.

  • I get an ImportError when launching MITMf!

  • Please read the installation guide.

  • Dude, no documentation?

  • The docs are a work in progress at the moment, once the framework hits 1.0 I will push them to the wiki