You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 19, 2020. It is now read-only.
Copy file name to clipboardExpand all lines: README.md
+54-1Lines changed: 54 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,11 +40,13 @@ refer to the wiki for [Installation](https://github.com/P0cL4bs/WiFi-Pumpkin/wik
40
40
* Karma Attacks (support hostapd-mana)
41
41
* LLMNR, NBT-NS and MDNS poisoner (Responder)
42
42
* Pumpkin-Proxy (ProxyServer (mitmproxy API))
43
+
* Capture images on the fly
44
+
* TCP-Proxy
45
+
43
46
44
47
### Plugins
45
48
| Plugin | Description |
46
49
|:-----------|:------------|
47
-
[net-creds](https://github.com/DanMcInerney/net-creds) | Sniff passwords and hashes from an interface or pcap file
48
50
[dns2proxy](https://github.com/LeonardoNve/dns2proxy) | This tools offer a different features for post-explotation once you change the DNS server to a Victim.
49
51
[sslstrip2](https://github.com/LeonardoNve/sslstrip2) | Sslstrip is a MITM tool that implements Moxie Marlinspike's SSL stripping attacks based version fork @LeonardoNve/@xtr4nge.
50
52
[sergio-proxy](https://github.com/supernothing/sergio-proxy) | Sergio Proxy (a Super Effective Recorder of Gathered Inputs and Outputs) is an HTTP proxy that was written in Python for the Twisted framework.
@@ -114,6 +116,57 @@ class Nameplugin(PluginTemplate):
114
116
#### About plugins
115
117
[plugins](https://github.com/P0cL4bs/WiFi-Pumpkin/wiki/Plugins) on the wiki
116
118
119
+
#### TCP/UDP Proxy
120
+
A proxy that you can place between in a TCP stream. It filters the request and response streams with ([scapy](http://www.secdev.org/projects/scapy/) module) and actively modify packets of a TCP protocol that gets intercepted by WiFi-Pumpkin. this plugin uses modules to view or modify the intercepted data that possibly easiest implementation of a module, just add your custom module on "plugins/analyzers/" automatically will be listed on TCP/UDP Proxy tab.
121
+
122
+
```python
123
+
from scapy.all import*
124
+
from scapy_http import http # for layer HTTP
125
+
from default import PSniffer # base plugin class
126
+
127
+
classExamplePlugin(PSniffer):
128
+
_activated =False
129
+
_instance =None
130
+
meta = {
131
+
'Name' : 'Example',
132
+
'Version' : '1.0',
133
+
'Description' : 'Brief description of the new plugin',
134
+
'Author' : 'your name',
135
+
}
136
+
def__init__(self):
137
+
for key,value inself.meta.items():
138
+
self.__dict__[key] = value
139
+
140
+
@staticmethod
141
+
defgetInstance():
142
+
if ExamplePlugin._instance isNone:
143
+
ExamplePlugin._instance = ExamplePlugin()
144
+
return ExamplePlugin._instance
145
+
146
+
deffilterPackets(self,pkt): # (pkt) object in order to modify the data on the fly
147
+
if pkt.haslayer(http.HTTPRequest): # filter only http request
148
+
149
+
http_layer = pkt.getlayer(http.HTTPRequest) # get http fields as dict type
150
+
ip_layer = pkt.getlayer(IP)# get ip headers fields as dict type
151
+
152
+
print http_layer.fields['Method'] # show method http request
0 commit comments