mitmAP - Create a fake AP and sniff data

📡 A python program to create a fake AP and sniff data.
           _ _              ___  ______
          (_) |            / _ \ | ___ \
 _ __ ___  _| |_ _ __ ___ / /_\ \| |_/ /
| '_ ` _ \| | __| '_ ` _ \|  _  ||  __/
| | | | | | | |_| | | | | | | | || |    
|_| |_| |_|_|\__|_| |_| |_\_| |_/\_| 2.2

A python program to create a fake AP and sniff data.

new in 2.0:

  • SSLstrip2 for HSTS bypass
  • Image capture with Driftnet
  • TShark for command line .pcap capture

features:

  • SSLstrip2
  • Driftnet
  • Tshark
  • Full featured access point, with configurable speed limit
  • mitmproxy
  • Wireshark
  • DNS Spoofing
  • Saving results to file

requirements:

Kali Linux / Raspbian with root privileges
A wireless card and an ethernet adapter / 2 wireless card
Python3 (mitmAP will install the dependenices, you don't have to do it)

starting:

  • Kali Linux -> "sudo python3 mitmAP.py"
  • Raspberry PI -> "sudo python3 mitmAP_rpi.py"
Powered by Blogger.