Note: Configuration file is now DEPRECATED! Expect removal in Version 5.0
Modules:
Harvesting Module is functional.
Code Injection Module is functional. Now with Metasploit!
Requires Metasploit to be installed and in PATH
Module Builder
Tunnel Block Module is functional.
DOS Module is functional.
Network View Control interface is functional. Now with Nmap!
Beta 4.1 Mandatory Updates for the Release:
Settings Page Display Current Configuration
Link Controls to Settings Page
Make Dynamic ARP Poisoning Work
Update Functionality
Move Settings/Configuration to database
Known Defects:
Possible ARPWatch Config Error — Local IP Address Unknown
ChangeLog:
Program Structure:
General:
Developed Network View
Integrated Nmap
Added update functionality through SVN
Move Settings/Configuration to database
Using Both Config File and Database for 4.1
Database tables/space created for settings
Ported configuration file reads to database queries
Link Controls to Settings Page
Issue:
50 Defect New Medium Mtoussain› Interface change
The settings page now properly displays current attack.
52DefectNewMediumMtoussain› Gatway IP Settings
The settings page now properly displays current attack (Same issue as above).
54DefectNewMediumMtoussain› ARPWATCH not Operable
ARPWATCH now properly configures and runs. It is now operated by the Attack Controller.
Functionality:
General:
Database now stores and tracks the following
Local IP Address
Attack Interface
Router MAC Address
Gateway IP Address
Auto Config Status
Page Reload Rate
Inject Rate
ARP Cache Poison Rate
Dynamic ARP Poison Status
Addition:
Dynamic ARP Retention is now operable
Dynamic ARP Retention can now be controlled from the settings page
All attacks are now rendered from the Attack Controller (attackctrl.py)
- This allows for additional MITM vectors to be used in the future
New Modules:
No new Modules in this release
Bug Fixes:
General:
Settings page failed to display current configuration
HTTP_REFERER ERROR referenced nonexistent config.ext file in settings page
Resolved JavaScript conflicts that caused all attempted configuration from the settings page to fail
Fixed errors preventing update functionality from working properly
- Credential Harvester
- Http Injection Code
- Session Hijacking
- Race Condition Exploitation
- Evilgrade update exploitation
- Wireless attack suite
- and more …
![]() |
Subterfuge ScreenShoot GUI For Unix/Linux Tool |
Download Latest : SubterfugePublicBeta4.1.tar.gz (18.7 MB)
Find Other Version |
Read more In here : http://code.google.com/p/subterfuge/
Our Post Before:
- http://www.seclist.us/2012/07/update-subterfuge-v-40-automated-man-in.html
- http://www.seclist.us/2012/06/update-subterfuge-v-30-automated-man-in.html
- http://www.seclist.us/2012/05/update-subterfuge-v-21-automated-man-in.html
- http://www.seclist.us/2012/05/update-subterfuge-v-20-automated-man-in.html
- http://www.seclist.us/2012/04/update.html
- http://www.seclist.us/2012/04/subterfuge-v-10-automated-man-in-middle.html