Skip to content
This repository has been archived by the owner on Nov 27, 2021. It is now read-only.
/ mr-toot Public archive

An package for MITMing and sniffing proxy credentials on IITG network 🔐

License

Notifications You must be signed in to change notification settings

narenchoudhary/mr-toot

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Mr. Toot

Find proxy credentials of users under same gateway/router.

The idea is to perform arp spoofing and then extract the proxy credentials from the headers of intercepted packets.

The inital CONNECT request to proxy server is sent unsecured and this request has proxy-username and proxy-password in it. Capture those packets, parse them and get the credentials.

Usage

This package works only on Python3.

Scapy is a dependency. And Scapy requires sudo access for sending packets. When you run sudo, the virtualenv environment variables, aliases, functions, etc are not carried over. So using virtualenv won't work.

git clone https://github.com/narenchoudhary/mr-toot.git
cd mr-toot
pip install -r requirements.txt
sudo python3 -m mrtoot.arp_poison

About

An package for MITMing and sniffing proxy credentials on IITG network 🔐

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages