-
Notifications
You must be signed in to change notification settings - Fork 9
/
mitmf.cfg
79 lines (59 loc) · 2.74 KB
/
mitmf.cfg
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
## Configuration file for Nethunter MITMF improved.
## Uncomment the line if you plan to add anything after the "=" sign
## Otherwise keep it commented out to prevent errors from the config parser
## 0 is OFF
## 1 is ON
INTERFACE = eth0
INJECT = 1
JS_URL = http://127.0.0.1:3000/hook.js
HTML_URL = http://127.0.0.1/inject.html
HTA_DRIVEBY = 0
# HTA_TEXT =
# HTA_APP =
# Start the spoofing plugin
SPOOF = 1
# Set to 1 to automatically acquire gateway IP. The line SPOOF_GATEWAY will be ignored. Doesn't work 100% such as Cisco-Meraki Setups that default to 10.128.128.128 (a defensive measure by IT to prevent ARP spoofing attacks on corporate networks)
# set to 0 manually set gateway to ARP spoof on the line SPOOF_GATEWAY
AUTO_ACQUIRE_GATEWAY = 1
# You have four spoofing options
# ARP, DNS, DHCP, ICMP
SPOOF_TYPE = ARP
SPOOF_GATEWAY = 10.30.0.1
# You have two options here, either ARP_MODE = REPLY (default) or ARP_MODE = REQUEST
ARP_MODE = REPLY
# SPOOF_GATEWAY_MAC =
# Leaving SPOOF_TARGET commented out will spoof the entire subnet
# SPOOF_TARGET =
# DHCP_SHELLSHOCK_PAYLOAD =
APP_POISON = 1
UPSIDEDOWN_INTERNET = 0
BROWSER_PROFILER = 1
# Due to issues with FILEPWN and browsersniper's inability to interact with the msfrpcd, BDF proxy will automatically start now along with Metasploit framework. BDFProxy's code implies that it will check for a current bdfproxy.cfg file in the current directory to use FIRST. So make sure you configure just the bdfproxy.cfg in this installation's directory, as that is what bdfproxy will listen to.
FILEPWN = 0
SMB_AUTH = 0
FERRET_NG = 1
FERRET_NG_PORT = 1000
# FERRET_NG_COOKIES =
BROWSER_SNIPER = 0
JS_KEYLOGGER = 1
REPLACE = 1
HSTS = 1
RESPONDER_PLUGIN = 1
RESPONDER_ANALYZE = 0
RESPONDER_WREDIR = 1
RESPONDER_NBTNS = 1
RESPONDER_FINGERPRINT = 1
RESPONDER_LM = 1
RESPONDER_WPAD = 1
# This option is not available at the most current mitmf version for the Kali repos, for ARMRF, AKA, nethunter devices.
RESPONDER_FORCE_WPADAUTH = 0
# Activate the Proxy ARP bridge between two network interfaces
# This is handy when you want two completely segregated networks between two physical network cards to be reachable (by both sides)
# That allows you to physically attack both networks at once, or make one segregated network attack the other (two different routers connected to two of your Wi-Fi adapters)
# Please read more about Proxy ARP Daemons https://blog.pgeiser.com/posts/2017/04/wireless-to-ethernet-bridge-with-an-arp-proxy/
PROXY_ARP_MODE = 0
# This can be two wireless cards, wlan1 + wlan2 or a ethernet card eth0 + wlan0
NETIFACE_ONE = eth0
NETIFACE_TWO = wlan0
# Activate debugging for Proxy ARP. Extremely verbose output, be warned!
PARP_DEBUG_MODE = 0