def init():
	init.Author             ="RedToor"
	init.Version            ="1.0"
	init.Description        ="Wifi Phising (evil twin)"
	init.CodeName           ="wifi/ev.twin"
	init.DateCreation       ="31/05/2016"      
	init.LastModification   ="09/07/2016"
	init.References         =None
	init.License            =KTF_LINCENSE
	init.var                ={}

	# DEFAULT OPTIONS MODULE
	init.options = {
		# NAME    VALUE                        RQ     DESCRIPTION
		'drive'   :[INTERFACE_DEVICE          ,True ,'Interface'],
		'driveMon':[INTERFACE_MONITOR         ,True ,'Monitor Interface'],
		'essid'   :["movil_wifi"              ,True ,'AP Essid'],
		'bssid'   :[MAC_TARGET                ,True ,'AP Mac Address'],
		'template':["files/wifi/tmp/neutral/" ,True ,'Files Phising'],
		'channel' :["11"                      ,True ,'Channel AP']
	}
	# EXTRA OPTIONS MODULE
	init.extra = {
		# NAME    VALUE                        RQ     DESCRIPTION
		'ip_range':["192.168.1.1"             ,False,'Ip Range'],
	}
	# AUX INFORMATION MODULE
	init.aux = """
 Devices Founds: """+str(get_interfaces())+"""
 Monitors Inter: """+str(get_monitors_mode())+"""
 Functions     : For Scan Ap's, type 'f::get_aps(Monitor_Interface,Time)'
                 For Start Monitor Mode, type 'f::start_monitor(Interface)' 
 """
	return init
Exemple #2
0
def init():
	init.Author             ="RedToor"
	init.Version            ="1.0"
	init.Description        ="Network Sniffer"
	init.CodeName           ="net/sc.sniff"
	init.DateCreation       ="22/03/2016"      
	init.LastModification   ="18/05/2016"
	init.References         =None
	init.License            =KTF_LINCENSE
	init.var                ={}

	# DEFAULT OPTIONS MODULE
	init.options = {
		# NAME       VALUE               RQ     DESCRIPTION
		'interface' :[INTERFACE_ETHERNET,True ,'Monitor Interface'],
		'filter'    :["ALL"             ,False,'Filter sniff']
	}
	
	init.aux = """
 (filter) options
 -> [ALL] Whatever
 -> [DNS] Domains Name Service
 -> [FTP] File Transfer Protocol
 -> [POP] Post Office Protocol

 Devices Founds: """+str(get_interfaces())+"""
 Monitors Inter: """+str(get_monitors_mode())+"""
 Functions     : For Start Monitor Mode, type 'f::start_monitor(Interface)' 
"""
	return init
def init():
    init.Author = "Thomas TJ 2016 (TTJ)"
    init.Version = "1.0"
    init.Description = "HTTP sniffer"
    init.CodeName = "net/sc.sniffhttp"
    init.DateCreation = "09/11/2016"
    init.LastModification = "09/11/2016"
    init.References = None
    init.License = KTF_LINCENSE
    init.var = {}

    # DEFAULT OPTIONS MODULE
    init.options = {
        # NAME		VALUE				RQ	 DESCRIPTION
        'interface': [INTERFACE_ETHERNET, True, 'Monitor Interface'],
        'filter': ["ALL", False, 'Filter sniff'],
        'onlycreds': ["n", False, 'Only show creds (y/n)'],
        'hideempty': ["y", False, 'Hide empty pkts (y/n)'],
        'ignore': ["n", False, 'Ignore js etc. (y/n)']
    }

    init.aux = """
 (filter) options
 -> [ALL]  Whatever
 -> [DNS]  Domains Name Service
 -> [FTP]  File Transfer Protocol
 -> [POP]  Post Office Protocol
 -> [HTTP] HTTP
 -> [MAIL] Mail (25, 110, 143)

 Devices Founds: """ + str(get_interfaces()) + """
 Monitors Inter: """ + str(get_monitors_mode()) + """
 Functions	 : For Start Monitor Mode, type 'f::start_monitor(Interface)' 
"""
    return init
Exemple #4
0
def init():
    init.Author = "RedToor"
    init.Version = "1.0"
    init.Description = "Network Sniffer"
    init.CodeName = "net/sc.sniff"
    init.DateCreation = "22/03/2016"
    init.LastModification = "18/05/2016"
    init.References = None
    init.License = KTF_LINCENSE
    init.var = {}

    # DEFAULT OPTIONS MODULE
    init.options = {
        # NAME       VALUE               RQ     DESCRIPTION
        'interface': [INTERFACE_ETHERNET, True, 'Monitor Interface'],
        'filter': ["ALL", False, 'Filter sniff']
    }

    init.aux = """
 (filter) options
 -> [ALL] Whatever
 -> [DNS] Domains Name Service
 -> [FTP] File Transfer Protocol
 -> [POP] Post Office Protocol

 Devices Founds: """ + str(get_interfaces()) + """
 Monitors Inter: """ + str(get_monitors_mode()) + """
 Functions     : For Start Monitor Mode, type 'f::start_monitor(Interface)' 
"""
    return init
Exemple #5
0
def init():
	init.Author             ="RedToor"
	init.Version            ="2.1"
	init.Description        ="Wifi Denegation of service"
	init.CodeName           ="wifi/ap.dos"
	init.DateCreation       ="11/06/2015"      
	init.LastModification   ="24/05/2016"
	init.References         =None
	init.License            =KTF_LINCENSE
	init.var                ={}

	# DEFAULT OPTIONS MODULE
	init.options = {
		# NAME    VALUE              RQ     DESCRIPTION
		'drive'  :[INTERFACE_MONITOR,True ,'Interface'],
		'bssid'  :[MAC_TARGET       ,True ,'AP Mac Address'],
		'target' :["ALL"            ,True ,'Targes'],
	}

	# AUX INFORMATION MODULE
	init.aux = """
 (target) options 
 -> [ALL] all wireless clients.
 -> [MAC] a single client access.

 Devices Founds: """+str(get_interfaces())+"""
 Monitors Inter: """+str(get_monitors_mode())+"""
 Functions     : For Scan Ap's, type 'f::get_aps(Monitor_Interface,Time)'
                 For Start Monitor Mode, type 'f::start_monitor(Interface)' 
 """
	return init
Exemple #6
0
def main(run):
	printAlert(3,"Computer")
	print "       | IP Local   : ",get_local_ip()
	print "       | Ip Externa : ",get_external_ip()
	print "       | Interfaces : ",get_interfaces()
	print "       | Gateway    : ",get_gateway()
	print "       | Machaddress: ",get_my_mac_address()	
	print "       | Username   : "******"       | OS         : ",commands.getoutput('uname')
	print "       | Version    : ",commands.getoutput('uname -r')
	printAlert(3,"Katana")
	print "       | Core       : ",Information.version
	print "       | Build      : ",Information.build
	Space()
def init():
	init.Author             ="RedToor"
	init.Version            ="1.0"
	init.Description        ="Web D.O.S Attack in LAN."
	init.CodeName           ="net/web.dos"
	init.DateCreation       ="31/07/2016"      
	init.LastModification   ="31/07/2016"
	init.References         =None
	init.License            =KTF_LINCENSE
	init.var                ={}

	# DEFAULT OPTIONS MODULE
	init.options = {
		# NAME      VALUE               RQ     DESCRIPTION
		'interface':[INTERFACE_ETHERNET,True ,'Interface'],
		'target'   :["www.test.com"    ,True ,'DNS Target']
	}

	init.aux = """
 Devices Founds: """+str(get_interfaces())+"""
	"""
	return init
Exemple #8
0
def init():
	init.Author             ="RedToor"
	init.Version            ="1.0"
	init.Description        ="DNS Spoofing"
	init.CodeName           ="net/dns.spoof"
	init.DateCreation       ="29/07/2016"      
	init.LastModification   ="29/07/2016"
	init.References         =None
	init.License            =KTF_LINCENSE
	init.var                ={}

	# DEFAULT OPTIONS MODULE
	init.options = {
		# NAME      VALUE               RQ     DESCRIPTION
		'interface':[INTERFACE_ETHERNET,True ,'Interface'],
		'hostfile' :["files/test/host" ,True ,'DNS\'s Spoofed File']
	}

	init.aux = """
 Devices Founds: """+str(get_interfaces())+"""
 Functions     : to edit the DNS rules. 'x::nano """+init.options['hostfile'][0]+"""'
	"""
	return init
Exemple #9
0
def init():
    init.Author = "RedToor"
    init.Version = "3.1"
    init.Description = "ARP Poisoning"
    init.CodeName = "net/arp.pson"
    init.DateCreation = "26/08/2015"
    init.LastModification = "27/07/2016"
    init.References = None
    init.License = KTF_LINCENSE
    init.var = {}

    # DEFAULT OPTIONS MODULE
    init.options = {
        # NAME      VALUE               RQ     DESCRIPTION
        'interface': [INTERFACE_ETHERNET, True, 'Interface'],
        'target': ["192.168.1.223", True, 'Target IP'],
        'gateway': [get_gateway(), True, 'Gateway IP'],
        'https': ["true", False, 'HTTP/s Capture']
    }

    init.aux = """
 Devices Founds: """ + str(get_interfaces()) + """
	"""
    return init
Exemple #10
0
def init():
    init.Author = "RedToor"
    init.Version = "1.0"
    init.Description = "DNS Spoofing"
    init.CodeName = "net/dns.spoof"
    init.DateCreation = "29/07/2016"
    init.LastModification = "29/07/2016"
    init.References = None
    init.License = KTF_LINCENSE
    init.var = {}

    # DEFAULT OPTIONS MODULE
    init.options = {
        # NAME      VALUE               RQ     DESCRIPTION
        'interface': [INTERFACE_ETHERNET, True, 'Interface'],
        'hostfile': ["files/test/host", True, 'DNS\'s Spoofed File']
    }

    init.aux = """
 Devices Founds: """ + str(get_interfaces()) + """
 Functions     : to edit the DNS rules. 'x::nano """ + init.options[
        'hostfile'][0] + """'
	"""
    return init
def init():
	init.Author             ="RedToor"
	init.Version            ="3.1"
	init.Description        ="ARP Poisoning"
	init.CodeName           ="net/arp.pson"
	init.DateCreation       ="26/08/2015"      
	init.LastModification   ="27/07/2016"
	init.References         =None
	init.License            =KTF_LINCENSE
	init.var                ={}

	# DEFAULT OPTIONS MODULE
	init.options = {
		# NAME      VALUE               RQ     DESCRIPTION
		'interface':[INTERFACE_ETHERNET,True ,'Interface'],
		'target'   :["192.168.1.223"   ,True ,'Target IP'],
		'gateway'  :[get_gateway()     ,True ,'Gateway IP'],
		'https'    :[True              ,False,'HTTP/s Capture']
	}

	init.aux = """
 Devices Founds: """+str(get_interfaces())+"""
	"""
	return init