yasserjanah/IZanamiFramework

GitHub: yasserjanah/IZanamiFramework

一个基于 ARP 与 DNS 欺骗的钓鱼框架,用于在受控环境中演示完整钓鱼攻击链路。

Stars: 14 | Forks: 5

# IZanamiFramework ![Python 3.x](https://img.shields.io/badge/python-v3.7-blue) ![Platform linux-debian-based](https://img.shields.io/badge/platform-linux--debian--based-red) ![BETA_VERSION](https://img.shields.io/badge/version-beta-yellow)

The Izanami Framework is a phishing attacks framework, that use ARP spoof attack and DNS spoofing attack to redirect all LAN devices HTTP requests to a specified address to perform a Powerful Phishing attack, IZanami inject beef-xss hook.js file into each requested HTML page , to target and exploit users's browsers. # 作者 ``` [+] AUTHOR: Yasser Janah [+] GITHUB: https://github.com/yasserjanah [+] TWITTER: https://twitter.com/th3x0ne [+] FACEBOOK: https://fb.com/yasser.janah0 ``` # 法律免责声明 使用 ***IZanami Framework*** 对未经事先相互同意的目标进行攻击是非法的。终端用户有责任遵守所有适用的地方、州和联邦法律。开发者不承担任何责任,也不对此程序的任何误用或损坏负责。***仅供教育用途。*** # 截图 ![ARP_SPOOFING_and_DNS_SPOOFING](https://i.ibb.co/9n0PJdv/Screenshot-from-2020-04-09-14-40-49.png) # 安装 ``` git clone https://github.com/yasserjanah/IZanamiFramework.git cd IZanamiFramework/ chmod +x arp_spoof.py dns_spoof.py runserver.sh cd scripts chmod +x install.sh ./installs.sh ``` # 用法 ``` *** Run this commands with root permissions *** 1) run ARP Spoofing attack : ``` ``` $ ./arp_spoof.py -t -g -i ``` ``` 2) configure config/dns.conf : ``` ``` $ nano config/dns.conf """ example of content of this file """ [google.com] ip = rule = O ==> Only This Domain OR AS ==> All Subdomain ``` ``` 3) run DNS Spoofing attack : ``` ``` $ ./dns_spoof.py ``` ``` 4) run web server : ``` ``` $ ./runserver.sh ``` DEMO Video Soon
标签:ARP欺骗, BeEF, CISA项目, Debian, DNS欺骗, Hook.js, HTTP劫持, Python3, 中间人攻击, 二进制发布, 局域网攻击, 开源工具, 教育用途, 浏览器利用, 爬虫, 用户态脱钩, 社会工程, 网络安全, 网络重定向, 逆向工具, 钓鱼框架, 隐私保护