https://github.com/klezvirus/mapt-run
Simple script to setup a local hosted network for Mobile Application Penetration Testing
https://github.com/klezvirus/mapt-run
evil-twin mapt mobile-penetration-testing
Last synced: 3 months ago
JSON representation
Simple script to setup a local hosted network for Mobile Application Penetration Testing
- Host: GitHub
- URL: https://github.com/klezvirus/mapt-run
- Owner: klezVirus
- License: mit
- Created: 2020-09-25T12:31:35.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2020-09-29T07:20:26.000Z (about 5 years ago)
- Last Synced: 2025-05-08T23:33:59.346Z (5 months ago)
- Topics: evil-twin, mapt, mobile-penetration-testing
- Language: Shell
- Homepage:
- Size: 43.9 KB
- Stars: 8
- Watchers: 2
- Forks: 6
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# mapt-run
Simple script to setup a local hosted network for Mobile Application Penetration Testing
## Overview
It often happens, a the very beginning of a mobile penetration test, to spend a bit of time setting up a correct lab environment. If using a physical device, part of this setup usually consists of a few steps:
* configure a hotspot via hostapd
* setup dnsmasq for the hosted network
* setup redsocks to wrap socket connections for BurpSuite
* setup iptables to provide internet to the hosted network
* other iptables configurationThis script provides a good start into automating this process, providing a nice set of configurable options.
## Note
This script is far from being finished. A lot of options might be added in future.
## Usage
Using the script is simple, as observable by the help:
```
# ################# MAPT Easy-Setup Script ################# #
# #
# This script has been made to easily generate and setup the environment for a Mobile PT #
# #
# ========================================================================================== #
# #
# Usage: #
# ./mapt-run -s -p -l -w [Optional args] #
# Required arguments: #
# -s: SSID for the hosted network #
# -w: WLAN interface #
# -l: LAN interface (internet access) #
# Optional arguments: #
# -p: Passphrase for the hosted network (default: Passw0rd!) #
# -g: generate configuration files for hostapd, dnsmasq and redsocks #
# -e: run hostapd, dnsmasq and redsocks (implies -g) #
# -r: redirect given IP addresses (comma divided) to redsocks #
# -i: install dependencies #
# -F: flush iptables chains #
# -K: kill all processes involved #
# -X: custom proxy (IP:PORT) (default: 127.0.0.1:8080) #
# -h: show this help #
# #
# ========================================================================================== #
```## Further work
* Enable VPN redirection
* Redsocks port customisation
* Many others