_ _ ___ ______
(_) | / _ \ | ___ \
_ __ ___ _| |_ _ __ ___ / /_\ \| |_/ /
| '_ ` _ \| | __| '_ ` _ \| _ || __/
| | | | | | | |_| | | | | | | | || |
|_| |_| |_|_|\__|_| |_| |_\_| |_/\_| 2.2
- SSLstrip2 for HSTS bypass
- Image capture with Driftnet
- TShark for command line .pcap capture
- Deauth the AP with just enter the BSSI of the existing AP
- SSLstrip2
- Driftnet
- Tshark
- Full featured access point, with configurable speed limit
- mitmproxy
- Wireshark
- DNS Spoofing
- Saving results to file
- Deauth the original AP during the Attack
Kali Linux / Raspbian with root privileges
the aireplay-ng to deauth the existing AP
A wireless card and an ethernet adapter / 2 wireless card
Python3 (mitmAP will install the dependenices, you don't have to do it)
"git clone https://github.com/bavxhack/mitmAP"
- Kali Linux -> "sudo python3 mitmAP.py"
- Raspberry PI -> "sudo python3 mitmAP_rpi.py"
Important: At the first run, choose 'y' on installing dependencies and on creating the config files!
I'm not responsible for anything you do with this program, so please only use it for good and educational purposes.