MITMProxy_PWNage | ️MITMProxy Ettercap PWNd

 by   kr1tzy Python Version: Current License: No License

kandi X-RAY | MITMProxy_PWNage Summary

kandi X-RAY | MITMProxy_PWNage Summary

MITMProxy_PWNage is a Python library typically used in Telecommunications, Media, Advertising, Marketing applications. MITMProxy_PWNage has no bugs, it has no vulnerabilities and it has low support. However MITMProxy_PWNage build file is not available. You can download it from GitHub.

The Fun Way for messing with friends, PWNing, etc. The Conservative Way for development, testing, etc.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              MITMProxy_PWNage has a low active ecosystem.
              It has 6 star(s) with 1 fork(s). There are 1 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              MITMProxy_PWNage has no issues reported. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of MITMProxy_PWNage is current.

            kandi-Quality Quality

              MITMProxy_PWNage has no bugs reported.

            kandi-Security Security

              MITMProxy_PWNage has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.

            kandi-License License

              MITMProxy_PWNage does not have a standard license declared.
              Check the repository for any license declaration and review the terms closely.
              OutlinedDot
              Without a license, all rights are reserved, and you cannot use the library in your applications.

            kandi-Reuse Reuse

              MITMProxy_PWNage releases are not available. You will need to build from source code and install.
              MITMProxy_PWNage has no build file. You will be need to create the build yourself to build the component from source.
              Installation instructions, examples and code snippets are available.

            Top functions reviewed by kandi - BETA

            kandi has reviewed MITMProxy_PWNage and discovered the below as its top functions. This is intended to give you an instant insight into MITMProxy_PWNage implemented functionality, and help decide if they suit your requirements.
            • Process the response body .
            • Load addon .
            Get all kandi verified functions for this library.

            MITMProxy_PWNage Key Features

            No Key Features are available at this moment for MITMProxy_PWNage.

            MITMProxy_PWNage Examples and Code Snippets

            No Code Snippets are available at this moment for MITMProxy_PWNage.

            Community Discussions

            No Community Discussions are available at this moment for MITMProxy_PWNage.Refer to stack overflow page for discussions.

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install MITMProxy_PWNage

            Inside of whatever virtualization software you use set up a shared NAT network. As an example, with VirtualBox go to VirtualBox->Preferences->Network and add an NAT Network. The network CIDR can be whatever you want, but for our demonstration we will use 10.0.2.0/24. Give it a name (e.g., NATNetw0rk), and check "Enable Network". Create two virtual machines, we used Ubuntu 18.04 for our "Attack" machine and Lubuntu 14.04 for our "Victim" machine. You can use whatever flavor of Linux you want but be mindful about setup differences. From here on out these machines will be denoted "Attack VM" and "Victim VM", respectively. Configure the network settings of each VM in VirtualBox, make sure their network cards are using the NAT network you created, in our case NATNetw0rk. After the VMs are created, statically assign IPs to each machine by configuring the interfaces in a similar (or identical) fashion.
            Inside of whatever virtualization software you use set up a shared NAT network. As an example, with VirtualBox go to VirtualBox->Preferences->Network and add an NAT Network. The network CIDR can be whatever you want, but for our demonstration we will use 10.0.2.0/24. Give it a name (e.g., NATNetw0rk), and check "Enable Network".
            Create two virtual machines, we used Ubuntu 18.04 for our "Attack" machine and Lubuntu 14.04 for our "Victim" machine. You can use whatever flavor of Linux you want but be mindful about setup differences. From here on out these machines will be denoted "Attack VM" and "Victim VM", respectively.
            Configure the network settings of each VM in VirtualBox, make sure their network cards are using the NAT network you created, in our case NATNetw0rk.
            After the VMs are created, statically assign IPs to each machine by configuring the interfaces in a similar (or identical) fashion.
            Attack VM /etc/network/interfaces
            Victim VM /etc/network/interfaces
            Restart the networking service of each VM.
            Make sure you can ping each other. For example, from the Attack VM ping 10.0.2.5, and from the Victim VM ping 10.0.2.3. You should be getting responses from both machines. Now we can set up Ettercap on the Attack VM.
            sudo sysctl -w net.ipv4.ip_forward=1
            sudo apt-get install ettercap-graphical
            sudo ettercap -G
            Under "Sniff" select "Unified Sniffing" and select the interface that was configured for the Attack VM - in our case it is enp0s3. Select "Ok".
            Go into "Hosts" and select "Hosts list" Click "Hosts" again and select "Scan for hosts" Add 10.0.2.1 (default gateway) to "Target 1" Add 10.0.2.5 (Victim VM) to "Target 2"
            Now click on "Mitm" and then "ARP poisoning..." Check the "Sniff remote connections." box and click "Ok"
            To verify we're getting traffic open a terminal and run sudo tcpdump. In the Victim VM open Firefox and go to google.com and come back to the tcpdump terminal screen and watch the traffic flow. Facebook won't populate on the Victim VM because we're not forwarding anything yet; however, we proved we're getting the traffic from the Victim VM so we can do IP forwarding and setup MITMProxy.
            Open preferences of Firefox and search for proxy Manually configure the proxy to localhost port 8080 for HTTP and HTTPS and press OK
            In the search bar go to "mitm.it" and download the cert. Check both boxes and accept
            Run the plugin
            cd firefox && ./install.sh
            This installs the MITMProxy certificate and an adequate firefox profile with proxying to port 8080.
            Run the plugin

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/kr1tzy/MITMProxy_PWNage.git

          • CLI

            gh repo clone kr1tzy/MITMProxy_PWNage

          • sshUrl

            git@github.com:kr1tzy/MITMProxy_PWNage.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link