Skip to content

pi-2r/my_MITM

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

Name: mitm Goal: Man in the Middle software

Software goals: The program must do a network scan, and allow the
user to do man in the middle attacks on specified target(s) or on a
whole ip range.
It must be able to bypass https connections (2 methods mandatory),
alter victims' data and log the network activities during the attack and going throug itself.

Mandatory Features:

  • CLI or curses
  • automated mitm for every host found with a predefined gate or host
  • 2 scan types: open/semi-open
  • 2 types of ssl-bypass: fake-https / non-https
  • regexp session definition
  • session stealing and usage through proxy
  • journalized logs (url, cookies, ...) with date and time
  • data injection:
  • on-the-fly vitcim's content modification
  • on-the-fly victim's url modification (one shot or automated with regexp)

About

simple projet scolaire mettant en avant les attaques réseaux de types Man In The Middle

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages