Questions tagged [mitmf]

MITMf is a Python framework for Man-In-The-Middle attacks.

11 questions
4
votes
1 answer

Stop DNSSpoof after login

Preface: I had an argument with a buddy the other day, he said it was impossible I disagreed. So say I have a large network of computers all visiting the same website for some reason. Then I have a DNS redirect from login.php (The original site). I…
Creg
  • 71
  • 3
3
votes
1 answer

MITMf which files can it patch

From this tutorial i found that it is possible using tool MITMf to patch exe files ''victim'' downloads in order to open a meterpreter shell. The commands that have been used are the following: use exploit/multi/handler set payloads…
mpla_mpla
  • 181
  • 1
  • 5
1
vote
2 answers

How to stop the "mitmf" tool on my home network?

Okay, so I am basically an electronics student so I have limited knowledge on the subject. So please help me out here. The thing is that one day, as I was browsing, I opened up Google and instead of the Google logo, a "You have been hacked" image…
1
vote
2 answers

MITMf as a Transparent Proxy?

Is it possible to use MITMf to sniff as a transparent proxy? If I connect to this proxy I would want to see my real IP, not the server IP. If possible, how can I do it? I found this file "ClientRequest.py" , but I don't know python. Maybe someone…
johnmet
  • 11
  • 1
1
vote
1 answer

MITMf arp spoofing inconsistent

using MITMf I'm getting inconsistent results, sometimes it just works, other times it just doesn't... I'm wondering is it like that for others or am I doing something wrong? the command I'm using just for arp spoofing no injecting or anything…
Reed Jones
  • 113
  • 1
  • 6
1
vote
2 answers

Replacing images on HTTPS sites with MITMf?

I'm using MITMf for replacing images over HTTP, and everything works fine. But how can I replace images on sites like Google or Facebook that uses HTTPS? My actual command: sudo python mitmf.py -i wlan0 --spoof --arp --hsts --gateway 192.168.1.254…
KDev
  • 13
  • 1
  • 3
1
vote
1 answer

How does mitmf-filepwn implement dns-spoofing?

While running the following command in Kali mitmf -i eth0 --arp --spoof --gateway 192.168.1.1 --target 192.168.1.4 --filepwn i have noticed that in latest chrome, when i typed google.gr the result was an http version of google. (Although that did…
mpla_mpla
  • 181
  • 1
  • 5
0
votes
1 answer

Does SSLSTRIP in MITMF only works when the victim visits for the first time?

I just started learning MITM attacks and I use MITMF to perfom these attacks. I have one question regarding to sslstrip. I notice that sslstrip only works when we first clear the cache and history in our victim's browser. Is this always the case?…
0
votes
1 answer

How to implement an active Man-In-The-Middle attack that changes the request URL address

For training purposes, I need some pointers on the tools and tips to implement an active Man-In-The-Middle attack. The attack scenario that I want to do is a toy example (which has countermeasures by server authentication) is the following: 1) The…
0
votes
1 answer

MITMF Is not connecting Metasploit (HTTP Injection)

I am attempting to inject malicious payload into http request. I own a personal lamp server, a Kali VM and a the most WindowsXP VM imaginable. and everything is on my network and legal. I have been following this…
user21303
  • 151
  • 2
  • 4
  • 11
-1
votes
1 answer

Strong TLS parameters even though MITM is being performed

I am performing a MITM attack against my own network using bettercap and https proxy. On my client-side I use the Google Chrome browser and navigate to https://webs.com At the same time I use a script that analyzes client-side TLS security…