Skip to main content

Minimalist and cross-platform network reverse engineering framework

Project description

FRida In The Middle

fritm is a minimalist, cross-platform (tested on macOS and Windows) network reverse engineering framework written in Python.

fritm-hook allows you to easily hook the `connect() <http://man7.org/linux/man-pages/man2/connect.2.html>`__ function with `frida <https://www.frida.re/>`__ to redirect all traffic from a target application.

You can then use the builtin server written in Python to initiate a Man-in-the-middle attack.

Even if you don’t want to use Python, you can use the fritm-hook command to redirect the traffic to your application and implement the simple lecture of the HTTP CONNECT header.

Installation

pip install fritm

Usage

Hook the process:

fritm-hook PROCESS_NAME_OR_PID
# or fritm-hook PROCESS_NAME_OR_PID -p PORT (default 8080)

Launch a proxy server in Python:

import select

from fritm import start_proxy_server


def dumb_callback(soClient, soServer):
    """Forwards all the traffic between the two sockets
    """
    conns = [soClient, soServer]
    other = {soClient: soServer, soServer: soClient}
    active = True
    try:
        while active:
            rlist, wlist, xlist = select.select(conns, [], conns)
            if xlist or not rlist:
                break
            for r in rlist:
                data = r.recv(8192)
                if not data:
                    active = False
                    break
                other[r].sendall(data)
    finally:
        for c in conns:
            c.close()

httpd = start_proxy_server(dumb_callback)

Now, all the traffic will go through your application. You can modify anything on the fly.

How does it work?

Hooking with fritm.hook(process, port)

  1. attach to the target process

  2. intercept the calls to `connect() <http://man7.org/linux/man-pages/man2/connect.2.html>`__

  3. replace the target IP address by 127.0.0.1 and the port with the chosen one

  4. execute the connect() function with the local IP

  5. just before returning, send the HTTP CONNECT method with the original IP and port

MITM with fritm.start_proxy_server(callback, port)

  1. Launch a local server that listens for connections on the given port

  2. Upon receiving a new connection from the hooked client, read the IP and port of the server from the HTTP CONNECT header

  3. Open a new socket to the server

  4. Call callback(socket_to_client, socket_to_server)

Differences with mitmproxy

  • mitmproxy doesn’t use function hooking, it intercepts all the traffic from your browser or computer

  • mitmproxy only works for HTTP traffic, whereas fritm works with any TCP traffic.

Differences with proxychains / proxychains-ng

  • fritm-hook is intented as simplified and cross-platform version of proxychains.

  • proxychains is not cross-platform and hard to install, whereas fritm is cross-platform and simple to install.

  • proxychains uses a config file whereas fritm-hook only takes two arguments

  • fritm includes a HTTP proxy server (that is also able to communicate with proxychains)

  • proxychains can handle a lot of different proxy types (SOCKS4, SOCKS5, HTTPS) with a lot of options (e.g. for authentification)

  • proxychains can chain multiple proxies

  • proxychains handles any proxy address whereas fritm-hook defaults to localhost. However, if anyone needs it for remote addresses, post an issue and I’ll implement it.

Current limitations

  • Some Windows user faced issues that I couldn’t reproduce

  • fritm will fail on IPv6 addresses, but it should not be hard to fix (I just don’t happen to have any application that uses an IPv6 address to test).

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

fritm-0.2.1.tar.gz (4.8 kB view details)

Uploaded Source

Built Distribution

fritm-0.2.1-py3-none-any.whl (6.1 kB view details)

Uploaded Python 3

File details

Details for the file fritm-0.2.1.tar.gz.

File metadata

  • Download URL: fritm-0.2.1.tar.gz
  • Upload date:
  • Size: 4.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.11.0 pkginfo/1.4.2 requests/2.21.0 setuptools/40.0.0 requests-toolbelt/0.8.0 tqdm/4.31.1 CPython/3.6.7

File hashes

Hashes for fritm-0.2.1.tar.gz
Algorithm Hash digest
SHA256 e2da90f1bb55fdc86aa08d17b757827a4a13ac3f082032c1f1a0209112710ddc
MD5 44866c91e5cef7a8c9ac882381a58e93
BLAKE2b-256 12ccbcc6aa2396e6d35490e4dd0ce2c9bbadbc1621dcae5a4a6cca1c433848f7

See more details on using hashes here.

File details

Details for the file fritm-0.2.1-py3-none-any.whl.

File metadata

  • Download URL: fritm-0.2.1-py3-none-any.whl
  • Upload date:
  • Size: 6.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.11.0 pkginfo/1.4.2 requests/2.21.0 setuptools/40.0.0 requests-toolbelt/0.8.0 tqdm/4.31.1 CPython/3.6.7

File hashes

Hashes for fritm-0.2.1-py3-none-any.whl
Algorithm Hash digest
SHA256 788425f0f6df6bd9471534f470b1bcb5ee025b91e3d0247a6f581557b1169549
MD5 972736cf087a5e94e99014ae4702d69b
BLAKE2b-256 017a8e737109a5a76b36ded0b6b5bce6a98f11ee2bdd6c2de96183cae4c4711c

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page