Skip to content

Latest commit

 

History

History
212 lines (164 loc) · 9.04 KB

README.md

File metadata and controls

212 lines (164 loc) · 9.04 KB

MITMProxy_PWNage

MITMProxy_PWNage_gif

About

  • MITMProxy_PWNage is a final project for the Network Security (CSE 5473) class at The Ohio State University. It demonstrates the power and flexiblity of MITMProxy by exhibiting our injector.py plugin alongside an ARP poisoning attack via Ettercap. The injector.py plugin dynamically finds and replaces text in a web response by parsing the HTML tags or following a regular expression. It can be utilized for both HTTP & HTTPS traffic.
  • Below we indicate two ways to play with the project: The Fun Way and The Conservative Way
    • The Fun Way is intended to be set up in a controlled virtualized network that will not touch a public domain. Furthermore, The Conservative Way is contained within a single virtual machine that will not touch a public domain. It can be used for testing, development, etc.
  • In order to avoid getting the security exception, one can run the install.sh script in the Victim VM (or locally) to install the MITMProxy cert. If this is not a previously accepted certificate the exception will come up each time prompting the user to avoid going to the site.
    • Note: in order to run the ./install.sh script on the Victim VM successfully the IP address should be changed inside the script to the Attack VM's.
  • We assume users will exercise caution, descretion, common sense, and judgement while using these tools and do not take responsibility for their actions.
  1. The Fun Way for messing with friends, PWNing, etc.

    • Involves ARP poisoning and running MITMProxy to view and manipulate your targets' HTTP & HTTPS traffic.
  2. The Conservative Way for development, testing, etc.

    • Involves running MITMProxy locally with Firefox proxy settings manually set in Firefox. Tested on Ubuntu 18.04.

The Fun Way

  • Virtual Network Setup
  • Setting up Ettercap
  • MITMProxy + Plugin
  • IP Forwarding
  • Running the plugin

Virtual Network Setup

  • Inside of whatever virtualization software you use set up a shared NAT network. As an example, with VirtualBox go to VirtualBox->Preferences->Network and add an NAT Network. The network CIDR can be whatever you want, but for our demonstration we will use 10.0.2.0/24. Give it a name (e.g., NATNetw0rk), and check "Enable Network".

  • Create two virtual machines, we used Ubuntu 18.04 for our "Attack" machine and Lubuntu 14.04 for our "Victim" machine. You can use whatever flavor of Linux you want but be mindful about setup differences. From here on out these machines will be denoted "Attack VM" and "Victim VM", respectively.

  • Configure the network settings of each VM in VirtualBox, make sure their network cards are using the NAT network you created, in our case NATNetw0rk.

  • After the VMs are created, statically assign IPs to each machine by configuring the interfaces in a similar (or identical) fashion.

  • Attack VM /etc/network/interfaces

auto lo
iface lo inet loopback 

auto enp0s3
 iface enp0s3 inet static
   address 10.0.2.3
   netmask 255.255.255.0
   gateway 10.0.2.1
   dns-nameservers 8.8.8.8
  • Victim VM /etc/network/interfaces
auto lo
iface lo inet loopback 

auto eth0
 iface eth0 inet static
   address 10.0.2.5
   netmask 255.255.255.0
   gateway 10.0.2.1
   dns-nameservers 8.8.8.8
  • Restart the networking service of each VM.
sudo systemctl restart networking.service
  • Make sure you can ping each other. For example, from the Attack VM ping 10.0.2.5, and from the Victim VM ping 10.0.2.3. You should be getting responses from both machines. Now we can set up Ettercap on the Attack VM.

Ettercap Setup (on Attack VM)

  • sudo sysctl -w net.ipv4.ip_forward=1
  • sudo apt-get install ettercap-graphical
  • sudo ettercap -G
  • Under "Sniff" select "Unified Sniffing" and select the interface that was configured for the Attack VM - in our case it is enp0s3. Select "Ok".
  • Go into "Hosts" and select "Hosts list"
    • Click "Hosts" again and select "Scan for hosts"
    • Add 10.0.2.1 (default gateway) to "Target 1"
    • Add 10.0.2.5 (Victim VM) to "Target 2"
  • Now click on "Mitm" and then "ARP poisoning..."
    • Check the "Sniff remote connections." box and click "Ok"
  • To verify we're getting traffic open a terminal and run sudo tcpdump. In the Victim VM open Firefox and go to google.com and come back to the tcpdump terminal screen and watch the traffic flow. Facebook won't populate on the Victim VM because we're not forwarding anything yet; however, we proved we're getting the traffic from the Victim VM so we can do IP forwarding and setup MITMProxy.

IP Forwarding

  • Run the following in the Attack VM
    • Make sure you have the right interface
sudo iptables -t nat -A PREROUTING -i enp0s3 -p tcp --dport 80 -j REDIRECT --to-port 8080
sudo iptables -t nat -A PREROUTING -i enp0s3 -p tcp --dport 443 -j REDIRECT --to-port 8080
  • To confirm run sudo iptables -t nat -L

MITMProxy + injector.py Plugin

Running

  • . venv/bin/activate
  • View the injector.py instructions below or view the source code to understand what you can do but the following example works.
    • Edit the parameters to get the desired functionality
  • Then run, mitmdump --mode transparent --showhost -s examples/addons/injector.py
  • Go to https://example.com and wallah, Pwn3d!

The Conservative Way

  • Set up Firefox to proxy MITMProxy
  • Set up MITMProxy + Plugin
  • Run the plugin

Setting up Firefox

Method 1 - Manual setup

  • Open preferences of Firefox and search for proxy
    • Manually configure the proxy to localhost port 8080 for HTTP and HTTPS and press OK
  • In the search bar go to "mitm.it" and download the cert.
    • Check both boxes and accept
  • Run the plugin

Method 2 - Run the install.sh script

  • cd firefox && ./install.sh
  • This installs the MITMProxy certificate and an adequate firefox profile with proxying to port 8080.
  • Run the plugin

MITMProxy + injector.py Plugin

Running

  • . venv/bin/activate
  • View the injector.py instructions below or view the source code to understand what you can do but the following example works.
    • Edit the parameters to get the desired functionality
  • Then run, mitmdump --mode transparent --showhost -s examples/addons/injector.py
  • Go to https://example.com and wallah, Pwn3d!

Injector.py

Edit the params inside of the script to get desired result

  1. URL
    • a FQDN or something as simple as "example" or "/stuff"
    • if left empty it will accept any domain
  2. SEARCH
    • Must be TAGS or ANY
    • TAGS finds and replaces text in specified HTML tags
    • ANY finds and replaces any text in the response that matches the regex
  3. REGEX
    • For TAGS the regex has to be for HTML tags
      • ex) "h1" or "h1|p" or "h1|p|title"
    • For ANY the regex can be for literally anything that regex can handle
      • ex) "Bacon" or "(\w+@\w+)|Search" or "^\w+@[a-zA-Z_]+?.[a-zA-Z]{2,3}$ "
  4. INJECT
    • whatever you want to replace the found text with
      • ex) "Str8 Pwn3d" or "Neato Burrito"
  • Then run,

     mitmdump --mode transparent --showhost -s examples/addons/injector.py 
    

Working Examples:

URL         =   "example"
SEARCH      =   "TAGS"
REGEX       =   "h1|p"
INJECT      =   "Str8 hack3d"
URL         =   "google"
SEARCH      =   "ANY"
REGEX       =   "Lucky|Google"
INJECT      =   "Hack3d"

Our Team

  • Noah Kritz - @kr1tzb1tz
  • Laura Mobley - @lauramobley
  • Sam Wolfe - @wolfe766
  • John Sparks - @Sparks2017

Acknowledgements