Skip to content

Simple MITM proxy with injection features.

Notifications You must be signed in to change notification settings

andreafortuna/MITMInjector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

70 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

MITMInjector

screenshot

Simple MITM proxy with injection features.

Initially designed for debugging purposes, during the development has turned into a tool useful for penetration testing, user tracking and social engineering assessment.

Usage

inject.py [-h] -u URL [-p PORT] [-P PAYLOAD || -W WEBWORKER] [-n] [-s]

URL: Url to clone

PAYLOAD: Js payload to inject into cloned page

WEBWORKER: Js webworker to inject into cloned page

-n: Export service using ngrok.com. In order to use this feature, you must register on ngrok.com, get your auth token from https://dashboard.ngrok.com/auth and save it into a file named ngroktoken.

-s: Mask ngrok url using TinyUrl

Available payloads

  • formgrabber: dumps all data written by target into page forms
  • geocoding: track target position using browser geolocation
  • ipgeolocation: track target position using IP geolocation

Docker and PaaS

The tool comes also with a custom Dockerfile that allows the build of a container with a sample phishing page: it can be simply customized and deployed on a PaaS.

Further, the “deploy.sh” script is useful to automatize the deploy on Heroku PaaS, passing as argument the url to “clone” (it needs the heroku cli client installed and configured):

$ ./deploy.sh https://www.facebook.com

Disclaimer

This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Author is not responsible or liable for misuse of the software. Use responsibly.