MITMf v0.9.7
Estrutura para a ataques man-in-the-middle
usage: mitmf.py [-h] [--log-level {debug,info}] [-i interface] [-c configfile]
[-d] [-p | -s | -a] [-l port] [-f] [-k] [--hsts] [--cachekill]
[--preserve-cookies] [--inject] [--js-url JS_URL]
[--html-url HTML_URL] [--html-payload HTML_PAYLOAD]
[--html-file HTML_FILE] [--match-str MATCH_STR]
[--preserve-cache]
[--per-domain | --rate-limit RATE_LIMIT | --count-limit COUNT_LIMIT | --white-ips WHITE_IPS | --black-ips BLACK_IPS]
[--browserprofiler] [--smbauth] [--host HOST] [--filepwn]
[--replace] [--search-str SEARCH_STR]
[--replace-str REPLACE_STR] [--regex-file REGEX_FILE]
[--keep-cache] [--upsidedownternet] [--responder] [--analyze]
[--basic] [--wredir] [--nbtns] [--fingerprint] [--wpad]
[--forcewpadauth] [--lm] [--verbose] [--jskeylogger]
[--appoison] [--spoof] [--arp | --icmp | --dhcp] [--dns]
[--shellshock PAYLOAD] [--gateway GATEWAY] [--target TARGET]
[--arpmode ARPMODE] [--manual-iptables] [--beefauto]
[--hijack] [--firefox] [--mallory] [--javapwn]
MITMf v0.9 - Framework for MITM attacks
optional arguments:
-h, --help show this help message and exit
MITMf:
Options for MITMf
--log-level {debug,info}
Specify a log level [default: info]
-i interface, --interface interface
Interface to listen on
-c configfile, --config-file configfile
Specify config file to use
-d, --disable-proxy Only run plugins, disable all proxies
SSLstrip:
Options for SSLstrip library
-p, --post Log only SSL POSTs. (default)
-s, --ssl Log all SSL traffic to and from server.
-a, --all Log all SSL and HTTP traffic to and from server.
-l port, --listen port
Port to listen on (default 10000)
-f, --favicon Substitute a lock favicon on secure requests.
-k, --killsessions Kill sessions in progress.
SSLstrip+:
Enables SSLstrip+ for partial HSTS bypass
--hsts Load plugin SSLstrip+
CacheKill:
Kills page caching by modifying headers
--cachekill Load plugin CacheKill
--preserve-cookies Preserve cookies (will allow caching in some
situations).
Inject:
Inject arbitrary content into HTML content
--inject Load plugin Inject
--js-url JS_URL Location of your (presumably) malicious Javascript.
--html-url HTML_URL Location of your (presumably) malicious HTML. Injected
via hidden iframe.
--html-payload HTML_PAYLOAD
Nenhum comentário:
Postar um comentário