def usage(): sdnpwn.addUsage("-t | --target", "Network or host address (i.e. 192.168.1.0/24)", True) sdnpwn.addUsage("-p | --port", "Ports to connect to (Default is 6633,6634,6653)") sdnpwn.addUsage("-v | --verbose", "Enable verbose output") sdnpwn.addUsage("-s | --socket-timeout", "Timeout for connection in seconds (Default is 2)") sdnpwn.addUsage("-c | --count", "Number of messages to send") sdnpwn.addUsage("-d | --delay", "Delay between messages") sdnpwn.addUsage("--hold-open", "Keep socket open after sending message") sdnpwn.addUsage("--hello", "Send OF Hello message") sdnpwn.addUsage("--echo-request", "Send an OF Echo Request") sdnpwn.addUsage("--packet-in", "Send an OF packet-in") sdnpwn.addUsage(" --xid", "XID for OF header") sdnpwn.addUsage(" --buffer-id", "Buffer ID for packet-in") sdnpwn.addUsage(" --total-length", "Length of data in packet-in (Calculated by default)") sdnpwn.addUsage(" --in-port", "Port packet was received on") sdnpwn.addUsage(" --reason", "Reason for packet-in. Can be 'match' or 'action'") sdnpwn.addUsage(" --data-raw", "Packet-in data as hex") sdnpwn.addUsage( " --data-scapy", "Packet-in data as scapy object (i.e. Ether()/IP()/TCP())") return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage(["-c", "--configure"], "Configure app before building", False) sdnpwn.addUsage(["-b", "--build"], "Root directory of app to build", True) sdnpwn.addUsage(["-k", "--keep-source"], "Keep source of generated application", False) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage(["--target", "-t"], "Target", True) sdnpwn.addUsage(["--listen", "-l"], "Listening socket (like 127.0.0.1:1234)", True) sdnpwn.addUsage(["--no-local", "-r"], "Do not start a local shell listener. Use if using nc, metasploit, etc to get shell", True) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("-l", "List all available modules") sdnpwn.addUsage("-s", "Search available modules") sdnpwn.addUsage("-n", "Create new module from base template") sdnpwn.addUsage("-t", "Specify template for new module (Optional with -n)") sdnpwn.addUsage("-r", "Delete module by name") return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("--iface", "Interface to use", True) sdnpwn.addUsage("--target", "IP address of target host", True) sdnpwn.addUsage("--loop", "Continue poisoning until stopped") sdnpwn.addUsage("--delay", "Delay between packets when looping") return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage(["-t", "--target"], "IP address of controller", True) sdnpwn.addUsage(["-p", "--port"], "Websocket port (Default 8181)", False) sdnpwn.addUsage( ["-c", "--cookie"], "Add cookie (like 'JSESSIONID=1sz99uvm1z2971t18f55lmpc0d')", False) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("--iface", "Interface to use", True) sdnpwn.addUsage("--target", "Target network (e.g. 192.168.1.0/24)", True) sdnpwn.addUsage("--phantom-ip", "IP to give the Phantom Host", True) sdnpwn.addUsage("--phantom-mac", "MAC address to give the Phantom Host") sdnpwn.addUsage("--packets", "Number of packets to send during the attack", True) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage(["--target", "-t"], "Set target IP or network (192.168.0.0/24)", True) sdnpwn.addUsage(["--port", "-p"], "Set ports to scan(e.g. 6633,6653 || 6000-7000)", True) sdnpwn.addUsage(["--socket-timeout", "-s"], "Set timeout for socket connections", False) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage(["-t", "--target"], "ONOS IP", True) sdnpwn.addUsage(["-p", "--port"], "ONOS web UI port (default 8181)", False) sdnpwn.addUsage( ["-a", "--app"], "Location of application to upload. Expects '.oar' file-type.", True) return sdnpwn.getUsage()
def usage(): ''' How to use the module. This function should return a string. sdnpwn_common contains functions to print the module usage in a table. These functions are "addUsage", "getUsage", and "printUsage". "addUsage" and "getUsage" are shown below. The parameters for addUsage are option, option description, and required (True or False) ''' sdnpwn.addUsage("-v", "Enable verbose output", False) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("-i | --iface", "Interface to use") sdnpwn.addUsage("-l | --lldp", "Determine controller based off LLDP traffic") sdnpwn.addUsage("-t | --target", "Determine controller based northbound interface") sdnpwn.addUsage("-p | --ports", "Set ports to scan when --target is specified.") sdnpwn.addUsage("-x | --proxy", "Define a proxy server to use when --target is specified.") sdnpwn.addUsage("-v | --verbose", "Show verbose output") return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage(["-t", "--target"], "IP address of controller", True) sdnpwn.addUsage(["-p", "--port"], "Websocket port (Default 8181)", False) sdnpwn.addUsage(["-c", "--cookie"], "Add cookie (like 'JSESSIONID=1sz99uvm1z2971t18f55lmpc0d')", False) sdnpwn.addUsage(["-s", "--summary"], "Request Summary events", False) sdnpwn.addUsage(["-d", "--topo"], "Request Topology events", False) sdnpwn.addUsage(["-b", "--pretty"], "Print event information in a human readable format", False) #sdnpwn.addUsage(["-k", "--keep-alive"], "Keep websocket open and receive new events", False) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("--iface", "Interface to use", True) sdnpwn.addUsage("--target-ip", "IP address of target", True) sdnpwn.addUsage("--target-mac", "MAC address of target") sdnpwn.addUsage("--ports", "Ports to scan. Seperate with comma (e.g. 22,23,80)", True) sdnpwn.addUsage("--phantom-ip", "IP address to give Phantom Host", True) sdnpwn.addUsage("--phantom-mac", "MAC address to give Phantom Host") return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("--iface", "Interface to use", True) sdnpwn.addUsage("--target1", "IP address for first target", True) sdnpwn.addUsage("--target1-mac", "MAC address for first target") sdnpwn.addUsage("--gateway", "Use network gateway as second target") sdnpwn.addUsage( "--target2", "IP address for second target (Required without -g option)") sdnpwn.addUsage("--target2-mac", "MAC address for second target") return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("-m", "Protocol to use (ICMP | ARP) (Default ARP)") sdnpwn.addUsage( "-t", "IP of local host to send traffic to (Defaults to default gateway)") sdnpwn.addUsage("-i", "Interval at which packets are sent (Default 1)") sdnpwn.addUsage( "-c", "Number of packets to send. More packets means better detection accuracy.(Default 10)" ) sdnpwn.addUsage("-v", "Enable verbose output") return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("-i | --iface", "Interface to use", True) sdnpwn.addUsage("-v | --victim", "IP address of victim", True) sdnpwn.addUsage("-vM| --victim-mac", "MAC address of victim") sdnpwn.addUsage("-t | --target-ip", "IP address to poisin in vicims ARP cache", True) sdnpwn.addUsage("-m | --mac", "MAC address to insert in the victims cache", True) sdnpwn.addUsage("-l | --loop", "Continue poisoning until stopped") sdnpwn.addUsage("-d | --delay", "Delay between packets when looping") return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("--iface1", "Set network interface 1", True) sdnpwn.addUsage("--iface2", "Set network interface 2", True) sdnpwn.addUsage( "--script", "Pass traffic through a custom script. Provide script location.") sdnpwn.addUsage( "--dos", "Only forward LLDP traffic and create a 'black hole' for other traffic" ) sdnpwn.addUsage("--verbose", "Get more output") return sdnpwn.getUsage()
def usage(): ''' How to use the module. This function should return a string. sdnpwn_common contains functions to print the module usage in a table. These functions are "addUsage", "getUsage", and "printUsage". "addUsage" and "getUsage" are shown below. The parameters for addUsage are option, option description, and required (True or False) ''' sdnpwn.addUsage("-i | --iface", "Interface to use", True) sdnpwn.addUsage("-c | --count", "Times to replay (Default 1)", False) sdnpwn.addUsage("-w | --capture", "Capture LLDP frame to file", False) sdnpwn.addUsage("-r | --replay", "Replay captured LLDP frame from file", False) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("-i | --iface", "Interface to use") sdnpwn.addUsage("-l | --lldp", "Determine controller based off LLDP traffic") sdnpwn.addUsage("-d | --dump-lldp", "Dump the contents of the LLDP message") sdnpwn.addUsage("-n | --ignore-content", "Do not detect controller based on LLDP content") sdnpwn.addUsage("-t | --target", "Determine controller based northbound interface") sdnpwn.addUsage("-p | --ports", "Set ports to scan when --target is specified.") sdnpwn.addUsage( "-x | --proxy", "Define a proxy server to use when --target is specified.") sdnpwn.addUsage("-v | --verbose", "Show verbose output") return sdnpwn.getUsage()
def usage(): ''' How to use the module. This function should return a string. sdnpwn_common contains functions to print the module usage in a table. These functions are "addUsage", "getUsage", and "printUsage". "addUsage" and "getUsage" are shown below. The parameters for addUsage are option, option description, and required (True or False) ''' sdnpwn.addUsage("-c | --controller", "IP address of controller (Default 127.0.0.1)", False) sdnpwn.addUsage("-p | --port", "Openflow port on controller (Default 6633)", False) sdnpwn.addUsage("-r | --config", "Switch configuration file to use", True) sdnpwn.addUsage("-l | --listen", "Port for switch relay proxy", False) sdnpwn.addUsage("-o | --output-to", "Interface to forward packet out message payloads", False) sdnpwn.addUsage("-f | --output-filter", "Filter packets by output port. Use with -o", False) sdnpwn.addUsage("-v | --verbose", "Enable verbose output", False) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("--iface1", "Set network interface 1", True) sdnpwn.addUsage("--iface2", "Set network interface 2", True) sdnpwn.addUsage("--relay", "Set relay method (bridge | tunnel)", True) sdnpwn.addUsage("--bridge-name", "Set name for bridge (Default is 'br0')") sdnpwn.addUsage( "--stp", "Allow spanning tree protocol traffic (on | off) (Default 'on')") sdnpwn.addUsage( "--tunnel-local", "IP address for local tunnel interface (Required for tunnel relay method)" ) sdnpwn.addUsage( "--tunnel-remote", "IP address for remote tunnel interface (Required for tunnel relay method)" ) sdnpwn.addUsage( "--bridge-ip", "IP address to use for bridge interface (Default '10.10.10.1/24')") return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("", "", False) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage(["-i", "--iface"], "Interface to use (Default eth0)", False) sdnpwn.addUsage(["-v", "--verbose"], "Enable verbose output", False) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage(["-i", "--iface"], "Interface to listen on", True) return sdnpwn.getUsage()
def usage(): sdnpwn.addUsage("-i | --iface", "Interface to use", True) sdnpwn.addUsage("-m | --mode", "Set mode ( watch or map )", True) return sdnpwn.getUsage()