Jump to content
begood

Imposter - framework to perform Browser Phishing attacks

Recommended Posts

Posted

What is Imposter?

Imposter is a flexible framework to perform Browser Phishing attacks. Once the system running Imposter is configured as the DNS server to the victims, the internal DNS server of Imposter resolves all DNS queries to itself. When the victim tries to access any website the domain resolves to the system running Imposter and Imposter’s internal web server serves content to the victim. Depending on the configuration appropriate payloads are sent to the victim. Data stolen from the victim is sent back to Imposter and this is stored in a SQLite database in a folder created with its name based on the date and time of the attack.

Capabilities:

Imposter can perform the following attacks:

1. Steal cookies

2. Set cookies

3. Steal Local Shared Objects

4. Steal stored passwords from FireFox

5. Steal cached files

6. Poison browser cache

7. Steal files from the victim’s local file system through Internet Explorer

8. Run SQL queries on the victim’s Google Gears database and transfer the results

9. Create ResourceStore and Managed ResourceStore on the victim’s Google Gears LocalServer

For the attacks related to Google Gears, the payload generated by Imposter automatically checks if the victim has installed and permitted Gears. This prevents any pop-up alerts to the user.

General Requirements:

1. Administrative Rights:

Reasons:

* Imposter listens on ports 53/UDP and 80/TCP

* The 'File Stealer' module runs an internal sniffer

2. System running Imposter should have the IP address 192.168.1.3

Reasons:

* Internal DNS server resolves all domains to 192.168.1.3

3. WinPcap must be installed on the system

Special requirements for the File Stealer module:

1. Linux Virtual Machine with IP address 192.168.1.2 configured in 'bridged' networking mode.

2. A samba network share named 'imp' with anonymous read access on the Linux VM.

3. This network share should a smbmount of the 'imp' folder that comes along with Imposter.

4. ‘imp’ folder containing ‘imposter.swf’ must be in the same directory as the Imposter binary

Steps by step set-up instructions:

1. Share the 'imp' folder in the Imposter directory with name 'imp_win'.

2. In the Linux VM create a folder '/imp' and map it to the 'imp_win' share with this command:

mount -t smbfs -o username=<win user name> //192.168.1.3/imp_win /imp

3. Add the following lines to the ‘smb.conf’ file:

[imp]

path = /imp

read only = yes

public = yes

4. Restart the smb service.

more : Attack and Defense Labs - User Guide | Imposter, Browser Phishing Tool

download : http://andlabs.org/tools/imposter/imposter_v0.9.zip

videos : Attack and Defense Labs - Videos | Security Tools and Techniques

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...