diff --git a/README.md b/README.md index 37abc74..66c6c8e 100644 --- a/README.md +++ b/README.md @@ -3,8 +3,9 @@ Modlishka is a powerful and flexible HTTP reverse proxy. It implements an entirely new approach of handling HTTP traffic flow, which allows to transparently proxy multi-domain destination TLS traffic over a single domain TLS certificate in an automated manner. What does this exactly mean? In short, it simply has a lot of potential, that can be used in many interesting ways... From the security perspective, Modlishka can be currently used to: +- Hijack application HTTP TLS traffic flow through the "Client Domain Hooking" attack. - Help penetration testers to carry out a modern ethical phishing campaign that requires a universal 2FA “bypass” support. -- Hijack application HTTP TLS traffic flow and perform a HTTP 301 Cache poisoning attack. +- Wrap legacy websites with TLS layer, confuse crawler bots and automated scanners, etc. - TBC Modlishka was written as an attempt overcome standard reverse proxy limitations and as a personal challenge to see what is possible with sufficient motivation and a bit of extra research time. @@ -35,10 +36,10 @@ Some of the most important 'Modlishka' features : - Stateless design. Can be scaled up easily to handle an arbitrary amount of traffic - e.g. through a DNS load balancer. - Can be extended easily with your ideas through modular plugins. - Automatic TLS certificate generation plugin for the proxy domain (requires a self-signed CA certificate) -- Written in Go, so it works basically on all platforms: Windows, Linux, BSD, ARM supported... +- Written in Go, so it works basically on all platforms and architectures: Windows, OSX, Linux, BSD supported... **Security related:** -- "[Client Domain Hooking](https://blog.duszynski.eu/hijacking-browser-tls-traffic-through-client-domain-hooking/)" attack in form of a diagnostic module. +- "[Client Domain Hooking](https://blog.duszynski.eu/client-domain-hooking-in-practice/)" attack in form of a diagnostic module. - Support for majority of 2FA authentication schemes (out of the box). - User credential harvesting (with context based on URL parameter passed identifiers). - Web panel plugin with a summary of automatically collected credentials and one-click user session impersonation module (beta POC). diff --git a/TODO b/TODO index e4bf9d8..a7f215b 100644 --- a/TODO +++ b/TODO @@ -1,11 +1,13 @@ # This is a TODO file with the most important long and short term tasks for this project. -# Help always appreciated :-) +# Help always kindly appreciated :-) - Create a logo image -- Move all of the phishing related functionalities to a seperate plugin -- Extend "Domain Client Hooking" plugin with more diagnosing features +- Move all of the phishing related functionalities to a seperate, dedicated, plugin +- Extend "Domain Client Hooking" plugin with more diagnosing features, visualisation and other useful features. - Improve control plugin: session impersonation -- Write support for NTLM authentication +- Write support for NTLM authentication. Possibly others as well. + +