{"id":1915,"date":"2009-07-03T10:43:04","date_gmt":"2009-07-03T10:43:04","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=1915"},"modified":"2015-09-09T19:38:00","modified_gmt":"2015-09-09T11:38:00","slug":"the-middler-user-session-cloning-mitm-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2009\/07\/the-middler-user-session-cloning-mitm-tool\/","title":{"rendered":"The Middler – User Session Cloning & MITM Tool"},"content":{"rendered":"
[ad]<\/p>\n
The Middler is a Man in the Middle tool to demonstrate protocol middling attacks. Led by Jay Beale, the project involves a team of authors including InGuardians agents Justin Searle and Matt Carpenter. The Middler is intended to man in the middle, or “middle” for short, every protocol for which we can create code.<\/p>\n
In our first alpha release, we released a core built by Matt and Jay, with introductory plug-ins by Justin and InGuardians agent Tom Liston. It runs on Linux and Mac OS X, with most of the code functional on Windows and BSD Unix.<\/p>\n
The current codebase is in the alpha state, but a beta release is coming soon, with better documentation (see the wiki), easier installation, and even more plug-ins.<\/p>\n
Plug-ins<\/strong><\/p>\n The author team has done a tremendous amount of research, design and pseudo-code work, fleshing out attacks on web-based e-mail systems and social networking sites. <\/p>\n Dependencies<\/strong><\/p>\n The Middler depends on the following Python modules:<\/p>\n You can download The Middler here:<\/p>\n\n
\n