Skip to content
forked from xdavidhu/mitmAP

📡 A python program to create a fake AP and sniff data.

License

Notifications You must be signed in to change notification settings

bavxhack/mitmAP

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

90 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

           _ _              ___  ______
          (_) |            / _ \ | ___ \
 _ __ ___  _| |_ _ __ ___ / /_\ \| |_/ /
| '_ ` _ \| | __| '_ ` _ \|  _  ||  __/
| | | | | | | |_| | | | | | | | || |    
|_| |_| |_|_|\__|_| |_| |_\_| |_/\_| 2.2

A python program to create a fake AP and sniff data.

new in 2.0:

  • SSLstrip2 for HSTS bypass
  • Image capture with Driftnet
  • TShark for command line .pcap capture
  • Deauth the AP with just enter the BSSI of the existing AP

features:

  • SSLstrip2
  • Driftnet
  • Tshark
  • Full featured access point, with configurable speed limit
  • mitmproxy
  • Wireshark
  • DNS Spoofing
  • Saving results to file
  • Deauth the original AP during the Attack

requirements:

Kali Linux / Raspbian with root privileges
the aireplay-ng to deauth the existing AP
A wireless card and an ethernet adapter / 2 wireless card
Python3 (mitmAP will install the dependenices, you don't have to do it)

downloading:

starting:

  • Kali Linux -> "sudo python3 mitmAP.py"
  • Raspberry PI -> "sudo python3 mitmAP_rpi.py"

Important: At the first run, choose 'y' on installing dependencies and on creating the config files!

disclaimer:

I'm not responsible for anything you do with this program, so please only use it for good and educational purposes.

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%