Tool developed in Python 3 using Scapy for MITM attacks
Project Structure | Installation | Configuring | Examples
mitm.py
├── include
| ├── arppoison.py
| ├── ftp_sniff.py
| └── http_sniff.py
├── requirements.txt
└── mitm.py
- ARP Poisoning
- FTP Sniffing
- HTTP Sniffing
- DNS Spoofing
- Captive Portal
To learn how to install the script, see the wiki Installation
To configure the hosts for DNS Spoofing attacks, you need to change the config/hosts.json, following these instructions:
{
"kali.ada.": "192.168.1.105",
"test.root.": "192.168.1.105"
}Set the key name as the host, and the value as the IP to be redirected. And remember to add the '.' at the end.
- Poisoning the ARP and executing DNS Spoofing
python3 mitm.py --arp --dns --gateway 192.168.1.1 --targets 192.168.1.106/192.168.1.104Remember to change the
config/hosts.jsonfile
- Sniffing all http requests
python3 mitm.py --http -vAll requests will be saved at
filesdirectory
- Sniffing all FTP credentials
python3 mitm.py --ftp -vAll credentials will be saved at
filesdirectory
- Enable Captive Portal
python3 mitm.py --arp --dns --captive --gateway 192.168.1.1 --targets 192.168.1.106Redirects all requests to your captive portal