Automated Man-in-the-Middle Attack Framework
Abstract:
Enter Subterfuge, a Framework to
take the arcane art of Man-in-the-Middle Attack and make it as simple as
point and shoot. A beautiful, easy to use interface which produces a
more transparent and effective attack is what sets Subterfuge apart from
other attack tools. Subterfuge demonstrates vulnerabilities in the ARP
Protocol by harvesting credentials that go across the network, and even
exploiting machines through race conditions. Now walk into a
corporation… A rapidly-expanding portion of today’s Internet strives to
increase personal efficiency by turning tedious or complex processes
into a framework which provides instantaneous results.
On the contrary, much of the information security community still
finds itself performing manual, complicated tasks to administer and
protect their computer networks. Given the increase in automated hacking
tools, it is surprising that a simplistic, “push-button” tool has not
been created for information security professionals to validate their
networks’ ability to protect against a Man-In-The-Middle attack.
Subterfuge is a small but devastatingly effective credential-harvesting
program which exploits a vulnerability in the Address Resolution
Protocol. It does this in a way that a non-technical user would have the
ability, at the push of a button, to harvest all of the usernames and
passwords of victims on their connected network, thus equipping
information and network security professionals with a “push-button”
security validation tool.
Download: http://code.google.com/p/subterfuge
Subterfuge DEFCON 20 Teaser: http://www.youtube.com
Home
»
EN
»
Framework
»
Linux
»
Mac
»
Man-in-the-Middle
»
Subterfuge
»
Windows
» [Subterfuge] Beta Version 4.2