44CON LONDON 2015 has ended
Back To Schedule
Friday, September 11 • 14:00 - 14:59
MITMf: Bringing Man-In-The-Middle attacks to the 21'st century

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Tired of managing countless scripts for automating your Man-In-The-Middle attacks?
Have a cool idea for a MITM attack, but don't want to spend hours writing a script from scratch?
Tired of bashing your head against the wall trying to figure out why Ettercap's filters are not working?
Well look no further!
MITMf combines new and old MITM techniques into a framework! Written in Python, It's built to be extremely extendible and reliable , while updating the current MITM attacks for the 21st century!
Currently the following plugins are available:
Responder - LLMNR, NBT-NS, WPAD and MDNS poisoner
SSLstrip+ - Partially bypass HSTS
Spoof - Redirect traffic using ARP Spoofing, ICMP Redirects or DHCP Spoofing
BeEFAutorun - Autoruns BeEF modules based on clients OS or browser type
AppCachePoison - Perform App cache poisoning attacks
Ferret-NG - Transparently hijacks sessions
BrowserProfiler - Attempts to enumerate all browser plugins of connected clients
CacheKill - Kills page caching by modifying headers
FilePwn - Backdoor executables being sent over HTTP using the Backdoor Factory and BDFProxy
Inject - Inject arbitrary content into HTML content
BrowserSniper - Performs drive-by attacks on clients with out-of-date browser plugins
jskeylogger - Injects a javascript keylogger into clients webpages
Replace - Replace arbitary content in HTML content
SMBAuth - Evoke SMB challenge-response auth attempts
Upsidedownternet - Flips images 180 degrees

Available on Github ! https://github.com/byt3bl33d3r/MITMf

avatar for Marcello Salvati

Marcello Salvati

Slightly paranoid IT security enthusiast/researcher with a pathological addiction to Sherlock Holmes novels, Sushi, Video Games and being in the middle.

Friday September 11, 2015 14:00 - 14:59 BST
Track 2

Attendees (0)