def main(run): commands.getoutput(NMAP_PATH+' -sn '+str(init.var['range'])+' -oX tmp/KTFVAR.xml > null') GateWay=get_gateway() tree = ET.parse('tmp/KTFVAR.xml') root = tree.getroot() IPf=0 counter=0 for host in root.findall('host'): for hosted in host.findall('address'): if hosted.get('addrtype') == "ipv4": IPf=hosted.get('addr') else: if GateWay == IPf : IPf=colors[8]+colors[4]+"{GW:"+IPf+"}"+colors[0] KTFVAR.append(" "+IPf+"\t"+str(hosted.get('addr'))+"\t"+str(hosted.get('vendor'))) Space() print " "+colors[10]+colors[7]+" # \t IP \t\t MAC \t\t VENDOR "+colors[0] for HOST in KTFVAR: counter+=1 print " ["+str(counter)+"]"+HOST Space() commands.getoutput('rm tmp/KTFVAR.xml > null') # END CODE MODULE ############################################################################################
def main(run): printAlert(3,"Computer") print " | IP Local : ",get_local_ip() print " | Ip Externa : ",get_external_ip() print " | Interfaces : ",get_interfaces() print " | Gateway : ",get_gateway() print " | Machaddress: ",get_my_mac_address() print " | Username : "******" | OS : ",commands.getoutput('uname') print " | Version : ",commands.getoutput('uname -r') printAlert(3,"Katana") print " | Core : ",Information.version print " | Build : ",Information.build Space()
def init(): init.Author ="RedToor" init.Version ="3.0" init.Description ="ARP Poisoning" init.CodeName ="net/at.arpsp" init.DateCreation ="26/08/2015" init.LastModification ="03/06/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'drive' :["eth0" ,True ,'Range Scan'], 'target' :["192.168.1.223",True ,'Target IP'], 'gateway':[get_gateway() ,True ,'Gateway IP'] } return init
def init(): init.Author ="RedToor" init.Version ="1.0" init.Description ="Arp Denegation of Service Attack." init.CodeName ="net/arp.dos" init.DateCreation ="14/06/2016" init.LastModification ="14/06/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface':[INTERFACE_ETHERNET,True ,'Interface'], 'target' :["192.168.1.223" ,True ,'Target IP'], 'gateway' :[get_gateway() ,True ,'Gateway IP'] } return init
def init(): init.Author = "RedToor" init.Version = "1.0" init.Description = "Arp Denegation of Service Attack." init.CodeName = "net/arp.dos" init.DateCreation = "14/06/2016" init.LastModification = "14/06/2016" init.References = None init.License = KTF_LINCENSE init.var = {} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface': [INTERFACE_ETHERNET, True, 'Interface'], 'target': ["192.168.1.223", True, 'Target IP'], 'gateway': [get_gateway(), True, 'Gateway IP'] } return init
def main(run): commands.getoutput(NMAP_PATH+' -sn '+str(init.var['range'])+' -oX tmp/KTFVAR.xml > null') GateWay=get_gateway() tree = ET.parse('tmp/KTFVAR.xml') root = tree.getroot() IPf=0 counter=0 for host in root.findall('host'): for hosted in host.findall('address'): if hosted.get('addrtype') == "ipv4": IPf=hosted.get('addr') else: if GateWay == IPf : IPf=colors[8]+colors[4]+"{GW:"+IPf+"}"+colors[0] KTFVAR.append(" "+IPf+"\t"+str(hosted.get('addr'))+"\t"+str(hosted.get('vendor'))) Space() print " "+colors[10]+colors[7]+" # \t IP \t\t MAC \t\t VENDOR "+colors[0] for HOST in KTFVAR: counter+=1 print " ["+str(counter)+"]"+HOST Space() commands.getoutput('rm tmp/KTFVAR.xml > null')
def main(run): commands.getoutput(NMAP_PATH + " -sn " + str(init.var["range"]) + " -oX tmp/KTFVAR.xml > null") GateWay = get_gateway() tree = ET.parse("tmp/KTFVAR.xml") root = tree.getroot() IPf = 0 counter = 0 for host in root.findall("host"): for hosted in host.findall("address"): if hosted.get("addrtype") == "ipv4": IPf = hosted.get("addr") else: if GateWay == IPf: IPf = colors[8] + colors[4] + "{GW:" + IPf + "}" + colors[0] KTFVAR.append(" " + IPf + "\t" + str(hosted.get("addr")) + "\t" + str(hosted.get("vendor"))) Space() print " " + colors[10] + colors[7] + " # \t IP \t\t MAC \t\t VENDOR " + colors[0] for HOST in KTFVAR: counter += 1 print " [" + str(counter) + "]" + HOST Space() commands.getoutput("rm tmp/KTFVAR.xml > null")
def init(): init.Author = "RedToor" init.Version = "3.1" init.Description = "ARP Poisoning" init.CodeName = "net/arp.pson" init.DateCreation = "26/08/2015" init.LastModification = "27/07/2016" init.References = None init.License = KTF_LINCENSE init.var = {} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface': [INTERFACE_ETHERNET, True, 'Interface'], 'target': ["192.168.1.223", True, 'Target IP'], 'gateway': [get_gateway(), True, 'Gateway IP'], 'https': ["true", False, 'HTTP/s Capture'] } init.aux = """ Devices Founds: """ + str(get_interfaces()) + """ """ return init
def init(): init.Author ="RedToor" init.Version ="3.1" init.Description ="ARP Poisoning" init.CodeName ="net/arp.pson" init.DateCreation ="26/08/2015" init.LastModification ="27/07/2016" init.References =None init.License =KTF_LINCENSE init.var ={} # DEFAULT OPTIONS MODULE init.options = { # NAME VALUE RQ DESCRIPTION 'interface':[INTERFACE_ETHERNET,True ,'Interface'], 'target' :["192.168.1.223" ,True ,'Target IP'], 'gateway' :[get_gateway() ,True ,'Gateway IP'], 'https' :[True ,False,'HTTP/s Capture'] } init.aux = """ Devices Founds: """+str(get_interfaces())+""" """ return init