

Parse specified pcap for credentials and exit p, -preserve-cache Don't kill client/server caching c CONFIG_FILE Specify config file to use v, -version show program's version number and exit h, -help show this help message and exit Note: you can modify filters on-the-fly without restarting MITMf! You will probably want to combine that with the Spoof plugin to actually intercept packets from someone else 😉 Now to use the filter all we need to do is: python mitmf.py -F ~/filter.py Use the data variable to access the raw packet data Use the packet variable to access the packet in a Scapy compatible format

You can now modify any packet/protocol that gets intercepted by MITMf using Scapy! (no more etterfilters! yay!)įor example, here's a stupid little filter that just changes the destination IP address of ICMP packets: Responder integration allows for LLMNR, NBT-NS and MDNS poisoning and WPAD rogue server support. MITMf will capture FTP, IRC, POP, IMAP, Telnet, SMTP, SNMP (community strings), NTLMv1/v2 (all supported protocols like HTTP, SMB, LDAP etc.) and Kerberos credentials by using Net-Creds, which is run on startup.

The configuration file can be edited on-the-fly while MITMf is running, the changes will be passed down through the framework: this allows you to tweak settings of plugins and servers while performing an attack. The framework contains a built-in SMB, HTTP and DNS server that can be controlled and used by the various plugins, it also contains a modified version of the SSLStrip proxy that allows for HTTP modification and a partial HSTS bypass.Īs of version 0.9.8, MITMf supports active packet filtering and manipulation (basically what etterfilters did, only better), allowing users to modify any type of traffic or protocol. Originally built to address the significant shortcomings of other tools (e.g Ettercap, Mallory), it's been almost completely re-written from scratch to provide a modular and easily extendible framework that anyone can use to implement their own MITM attack. MITMf aims to provide a one-stop-shop for Man-In-The-Middle and network attacks while updating and improving existing attacks and techniques. MITMf – Framework for Man-In-The-Middle attacks.
