Esempio n. 1
0
def main():

    version = bcolors.TITLE + ('''
 _    _  ___  ____________ ___________________   __
| |  | |/ _ \ | ___ \ ___ \  ___| ___ \ ___ \ \ / /
| |  | / /_\ \| |_/ / |_/ / |__ | |_/ / |_/ /\ V /
| |/\| |  _  ||    /| ___ \  __||    /|    /  \ /
\  /\  / | | || |\ \| |_/ / |___| |\ \| |\ \  | |
 \/  \/\_| |_/\_| \_\____/\____/\_| \_\_| \_| \_/

            TACTICAL EXPLOITATION

v4.0                              @sec_groundzero
                          [email protected]
''') + bcolors.ENDC

    parser = OptionParser(usage="usage: sudo %prog [options]", version=version)
    parser.add_option("-a",
                      "--attack",
                      action="store",
                      dest="attacktype",
                      default="-A",
                      help="Attack Mode." + bcolors.WARNING +
                      " Default: --attack" + bcolors.ENDC,
                      choices=[
                          '-A', '--attack', '-T', '--toptcp', '-B', '--topudp',
                          '-F', '--fulltcp'
                      ])
    parser.add_option("-p",
                      "--packets",
                      action="store",
                      dest="packets",
                      default=20,
                      type=int,
                      help="Number of Network Packets to capture")
    parser.add_option(
        "-I",
        "--interface",
        action="store",
        dest="iface",
        default="eth0",
        help="Network Interface to use." + bcolors.WARNING + " Default: eth0" +
        bcolors.ENDC,
        choices=['eth0', 'eth1', 'wlan0', 'wlan1', 'wlan2', 'at0'])
    parser.add_option("-N",
                      "--name",
                      action="store",
                      dest="name",
                      default="WarBerry",
                      help="Hostname to use." + bcolors.WARNING +
                      " Default: Auto" + bcolors.ENDC)
    parser.add_option("-i",
                      "--intensity",
                      action="store",
                      dest="intensity",
                      default="-T1",
                      help="Port scan intensity." + bcolors.WARNING +
                      " Default: T1" + bcolors.ENDC,
                      choices=['-T1', '-T2', '-T3', '-T4'])
    parser.add_option("-P",
                      "--poison",
                      action="store_false",
                      dest="poison",
                      default=True,
                      help="Turn Poisoning off." + bcolors.WARNING +
                      " Default: On" + bcolors.ENDC)
    parser.add_option("-Q",
                      "--quick",
                      action="store_true",
                      dest="fast",
                      default=False,
                      help="Scan using threads." + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-H",
                      "--hostname",
                      action="store_false",
                      dest="hostname",
                      default=True,
                      help="Do not change WarBerry hostname" +
                      bcolors.WARNING + " Default: Off" + bcolors.ENDC)
    parser.add_option("-e",
                      "--enumeration",
                      action="store_true",
                      dest="enum",
                      default=False,
                      help="Disable enumeration mode." + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-M",
                      "--malicious",
                      action="store_true",
                      dest="malicious",
                      default=False,
                      help="Enable Malicious only mode" + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-B",
                      "--bluetooth",
                      action="store_true",
                      dest="btooth",
                      default=False,
                      help="Enable Bluetooth Scanning" + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-W",
                      "--wifi",
                      action="store_true",
                      dest="wifi",
                      default=False,
                      help="Enable WiFi Scanning" + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-r",
                      "--recon",
                      action="store_true",
                      dest="reconmode",
                      default=False,
                      help="Enable Recon only mode. " + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-S",
                      "--sniffer",
                      action="store_true",
                      dest="sniffer",
                      default=False,
                      help="Enable Sniffer only mode." + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-C",
                      "--clear",
                      action="store_true",
                      dest="clear",
                      default=False,
                      help="Clear previous output folders in ../Results")
    parser.add_option("-m",
                      "--man",
                      action="store_true",
                      dest="manpage",
                      default=False,
                      help="Print WarBerry man pages")

    (options, args) = parser.parse_args()

    if options.clear == True:
        clear_output()
    elif options.manpage == True:
        subprocess.call('clear', shell=True)
        banner_full_help()
    elif options.attacktype == "-A" or options.attacktype == '--attack':
        subprocess.call('clear', shell=True)
        banner()
        if not os.geteuid() == 0:
            print bcolors.FAIL + '*** You are not running as root and some modules will fail ***\nRun again with sudo.' + bcolors.ENDC
            sys.exit(-1)
        dhcp_check()
        if (os.path.isfile('/sys/class/net/' + options.iface +
                           '/carrier') == True):
            iface = options.iface
        else:
            for ifaces in os.listdir("/sys/class/net/"):
                if ifaces[0] == "e":
                    file_iface = open("/sys/class/net/" + ifaces + "/carrier")
                    if file_iface.readline()[0] == "1":
                        iface = ifaces
        host_name = options.name
        int_ip = iprecon(iface)
        if (int_ip == None):
            exit
        else:
            if options.malicious == True:
                netmask = netmask_recon(iface)
                with open('../Results/running_status', 'a') as status:
                    status.write("Entering poisoning mode\n")
                    poison(iface)
            else:
                netmask = netmask_recon(iface)
                CIDR = subnet(int_ip, netmask)
                # external_IP_recon()
                scope_definition(iface, CIDR)
                with open('../Results/running_status', 'a') as status:
                    status.write("Completed IP Recon\n")
                packets = options.packets
                sniffer(iface, packets)
                with open('../Results/running_status', 'a') as status:
                    status.write("Completed sniffing network packets\n")
                pcap_parser()

                hostnames(CIDR)
                with open('../Results/running_status', 'a') as status:
                    status.write("Completed hostnames search\n")
                nbtscan(CIDR)
                with open('../Results/running_status', 'a') as status:
                    status.write("Completed NBTScan\n")
                if host_name != "WarBerry":
                    manual_namechange(host_name)
                if options.hostname == True and host_name == "WarBerry":
                    namechange()
                if options.reconmode == False:
                    intensity = options.intensity
                    if options.fast == False:
                        single_port_scanner(CIDR, intensity, iface)
                    else:
                        thread_port_scanner(CIDR, intensity, iface)
                    with open('../Results/running_status', 'a') as status:
                        status.write("Completed Port Scanning\n")
                    if options.enum == False:
                        shares_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed Enumerating Shares\n")
                        smb_users(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed Enumerating Users\n")
                        webs_prep()
                        http_title_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed Enumerating HTTP Titles\n")
                        nfs_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed NFS Enumeration\n")
                        waf_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed WAF Enumeration\n")
                        mysql_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed MYSQL Enumeration\n")
                        mssql_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed MSSQL Enumeration\n")
                        ftp_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed FTP Enumeration\n")
                        snmp_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed SNMP Enumeration\n")
                        clamav_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed ClamAV Enumeration\n")
                        informix_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed Informix DB Enumeration\n")
                        informix_tables(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write(
                                "Completed Informix Tables Enumeration\n")
                        sip_methods_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed SIP Methods Enumeration\n")
                        sip_users_enum(iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed SIP Users Enumeration\n")
                        aggressive_vpn()
                        with open('../Results/running_status', 'a') as status:
                            status.write(
                                "Completed Aggressive VPN Enumeration\n")
                        os_enum(CIDR, iface)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed OS Enumeration\n")
                        #enum4linux()
                        #with open('../Results/running_status', 'a') as status:
                        #    status.write("Completed enum4linux Enumeration\n")
                        zone_transfers(CIDR)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed zones Enumeration\n")
                    if options.btooth == True:
                        bluetooth_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed bluetooth scan\n")
                    if options.wifi == True:
                        wifi_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed wifi networks scan\n")
                    print ""
                print bcolors.TITLE + "All scripts completed. Check the /Results directory" + bcolors.ENDC
                print " "
                if options.poison == True:
                    with open('../Results/running_status', 'a') as status:
                        status.write("Entering poisoning mode\n")
                        poison(iface)

    elif options.attacktype == '-T' or options.attacktype == '--toptcp':
        subprocess.call('clear', shell=True)
        banner()
        iface = options.iface
        int_ip = iprecon(iface)
        if (int_ip == None):
            exit
        netmask = netmask_recon(iface)
        external_IP_recon()
        CIDR = subnet(int_ip, netmask)
        #scope_definition(iface, CIDR)
        top_ports_scanner(CIDR, options.intensity, iface)
        print bcolors.TITLE + "All scripts completed. Check the /Results directory" + bcolors.ENDC

    elif options.attacktype == '-B' or options.attacktype == '--tcpudp':
        subprocess.call('clear', shell=True)
        banner()
        iface = options.iface
        int_ip = iprecon(iface)
        if (int_ip == None):
            exit
        netmask = netmask_recon(iface)
        external_IP_recon()
        CIDR = subnet(int_ip, netmask)
        #scope_definition(iface, CIDR)
        if options.fast == True:
            tcpudp_thread_scanner(CIDR, options.intensity, iface)
        else:
            tcpudp_scanner(CIDR, options.intensity, iface)
        print bcolors.TITLE + "All scripts completed. Check the /Results directory" + bcolors.ENDC
    elif options.attacktype == '-F' or options.attacktype == '--fulltcp':
        subprocess.call('clear', shell=True)
        banner()
        iface = options.iface
        int_ip = iprecon(iface)
        netmask = netmask_recon(iface)
        external_IP_recon()
        CIDR = subnet(int_ip, netmask)
        #scope_definition(iface, CIDR)
        if options.fast == True:
            full_thread_scanner(CIDR, options.intensity, iface)
        else:
            full_scanner(CIDR, options.intensity, iface)
        print bcolors.TITLE + "All scripts completed. Check the /Results directory" + bcolors.ENDC
    elif options.attacktype == '-S' or options.attacktype == '--sniffer':
        iface = options.iface
        packets = options.packets
        subprocess.call('clear', shell=True)
        sniffer(iface, packets)
Esempio n. 2
0
def main():

    version = bcolors.TITLE + ( '''
 _    _  ___  ____________ ___________________   __
| |  | |/ _ \ | ___ \ ___ \  ___| ___ \ ___ \ \ / /
| |  | / /_\ \| |_/ / |_/ / |__ | |_/ / |_/ /\ V /
| |/\| |  _  ||    /| ___ \  __||    /|    /  \ /
\  /\  / | | || |\ \| |_/ / |___| |\ \| |\ \  | |
 \/  \/\_| |_/\_| \_\____/\____/\_| \_\_| \_| \_/

            TACTICAL EXPLOITATION

v4.0                              @sec_groundzero
                          [email protected]
''') + bcolors.ENDC


    parser = OptionParser(usage= "usage: sudo %prog [options]",version=version)
    parser.add_option("-a", "--attack", action="store", dest="attacktype", default="-A", help="Attack Mode."+ bcolors.WARNING + " Default: --attack" + bcolors.ENDC,choices=['-A','--attack','-T','--toptcp', '-B','--topudp', '-F', '--fulltcp'])
    parser.add_option("-p", "--packets", action="store", dest="packets", default=20, type=int, help="Number of Network Packets to capture")
    parser.add_option("-I", "--interface", action="store", dest="iface", default="eth0",help="Network Interface to use." + bcolors.WARNING + " Default: eth0" + bcolors.ENDC, choices=['eth0', 'eth1', 'wlan0', 'wlan1', 'wlan2', 'at0'])
    parser.add_option("-N", "--name", action="store", dest="name", default="WarBerry",help="Hostname to use." + bcolors.WARNING + " Default: Auto" + bcolors.ENDC)
    parser.add_option("-i", "--intensity", action="store", dest="intensity", default="-T1", help="Port scan intensity." + bcolors.WARNING + " Default: T1" + bcolors.ENDC,choices=['-T1', '-T2', '-T3', '-T4'])
    parser.add_option("-P", "--poison", action="store_false",dest="poison",default=True, help="Turn Poisoning off."+ bcolors.WARNING + " Default: On" + bcolors.ENDC)
    parser.add_option("-Q", "--quick", action="store_true", dest="fast", default=False, help="Scan using threads." + bcolors.WARNING + " Default: Off" + bcolors.ENDC)
    parser.add_option("-H", "--hostname", action="store_false", dest="hostname", default= True, help="Do not change WarBerry hostname" + bcolors.WARNING + " Default: Off" + bcolors.ENDC)
    parser.add_option("-e", "--enumeration", action="store_true",dest="enum", default=False, help="Disable enumeration mode." + bcolors.WARNING + " Default: Off" + bcolors.ENDC)
    parser.add_option("-M", "--malicious", action="store_true", dest="malicious", default=False, help="Enable Malicious only mode" + bcolors.WARNING + " Default: Off" + bcolors.ENDC)
    parser.add_option("-r", "--recon", action="store_true", dest="reconmode", default=False,help="Enable Recon only mode. " + bcolors.WARNING + " Default: Off" + bcolors.ENDC)
    parser.add_option("-S", "--sniffer", action="store_true", dest="sniffer", default=False,help="Enable Sniffer only mode." + bcolors.WARNING + " Default: Off" + bcolors.ENDC)
    parser.add_option("-C", "--clear", action="store_true", dest="clear", default=False, help="Clear previous output folders in ../Results")
    parser.add_option("-m", "--man", action="store_true", dest="manpage", default=False, help="Print WarBerry man pages")


    (options, args) = parser.parse_args()



    if options.clear == True:
        clear_output()
    elif options.manpage == True:
        subprocess.call('clear', shell=True)
        banner_full_help()
    elif options.attacktype == "-A" or options.attacktype == '--attack':
        subprocess.call('clear', shell=True)
        banner()
        if not os.geteuid() == 0:
            print bcolors.FAIL + '*** You are not running as root and some modules will fail ***\nRun again with sudo.' + bcolors.ENDC
            sys.exit(-1)
        dhcp_check()
        iface = options.iface
        host_name = options.name
        int_ip = iprecon(iface)
        if (int_ip == None):
            exit
        else:
            if options.malicious == True:
                netmask = netmask_recon(iface)
                with open('../Results/running_status', 'a') as status:
                    status.write("Entering poisoning mode\n")
                    poison(iface)
            else:
                netmask = netmask_recon(iface)
               # external_IP_recon()
                with open('../Results/running_status', 'a') as status:
                    status.write("Completed IP Recon\n")
                packets = options.packets
                sniffer(iface, packets)
                with open('../Results/running_status', 'a') as status:
                    status.write("Completed sniffing network packets\n")
                pcap_parser()
                CIDR = subnet(int_ip, netmask)
                #scope_definition(iface, CIDR)
                hostnames(CIDR)
                with open('../Results/running_status', 'a') as status:
                    status.write("Completed hostnames search\n")
                #nbtscan(CIDR)
                with open('../Results/running_status', 'a') as status:
                    status.write("Completed NBTScan\n")
                if host_name != "WarBerry":
                    manual_namechange(host_name)
                if options.hostname == True and host_name == "WarBerry":
                    namechange()
                if options.reconmode == False:
                    intensity = options.intensity
                    if options.fast == False:
                        single_port_scanner(CIDR, intensity)
                    else:
                        thread_port_scanner(CIDR, intensity)
                    with open('../Results/running_status', 'a') as status:
                        status.write("Completed Port Scanning\n")
                    if options.enum == False:
                        shares_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed Enumerating Shares\n")
                        smb_users()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed Enumerating Users\n")
                        domains_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed Enumerating Domains\n")
                        webs_prep()
                        http_title_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed Enumerating HTTP Titles\n")
                        nfs_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed NFS Enumeration\n")
                        waf_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed WAF Enumeration\n")
                        mysql_enum()
                        with open('../Results/running_status', 'a') as status:
                                status.write("Completed MYSQL Enumeration\n")
                        mssql_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed MSSQL Enumeration\n")
                        ftp_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed FTP Enumeration\n")
                        snmp_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed SNMP Enumeration\n")
                        clamav_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed ClamAV Enumeration\n")
                        informix_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed Informix DB Enumeration\n")
                        informix_tables()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed Informix Tables Enumeration\n")
                        sip_methods_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed SIP Methods Enumeration\n")
                        sip_users_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed SIP Users Enumeration\n")
                        os_enum(CIDR)
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed OS Enumeration\n")
                    bluetooth_enum()
                    with open('../Results/running_status', 'a') as status:
                        status.write("Completed bluetooth scan\n")
                    wifi_enum()
                    with open('../Results/running_status', 'a') as status:
                        status.write("Completed wifi networks scan\n")
                    print ""
                print bcolors.TITLE + "All scripts completed. Check the /Results directory" + bcolors.ENDC
                print " "
                if options.poison == True:
                    with open('../Results/running_status', 'a') as status:
                        status.write("Entering poisoning mode\n")
                        poison(iface)

    elif options.attacktype == '-T' or options.attacktype == '--toptcp':
        subprocess.call('clear', shell=True)
        banner()
        iface = options.iface
        int_ip = iprecon(iface)
        if (int_ip == None):
            exit
        netmask = netmask_recon(iface)
        external_IP_recon()
        CIDR = subnet(int_ip, netmask)
        #scope_definition(iface, CIDR)
        top_ports_scanner(CIDR, options.intensity)
        print bcolors.TITLE + "All scripts completed. Check the /Results directory" + bcolors.ENDC

    elif options.attacktype == '-B' or options.attacktype == '--tcpudp':
        subprocess.call('clear', shell=True)
        banner()
        iface = options.iface
        int_ip = iprecon(iface)
        if (int_ip == None):
            exit
        netmask = netmask_recon(iface)
        external_IP_recon()
        CIDR = subnet(int_ip, netmask)
        #scope_definition(iface, CIDR)
        if options.fast == True:
            tcpudp_thread_scanner(CIDR,options.intensity)
        else:
            tcpudp_scanner(CIDR, options.intensity)
        print bcolors.TITLE + "All scripts completed. Check the /Results directory" + bcolors.ENDC
    elif options.attacktype == '-F' or options.attacktype == '--fulltcp':
        subprocess.call('clear', shell=True)
        banner()
        iface = options.iface
        int_ip = iprecon(iface)
        netmask = netmask_recon(iface)
        external_IP_recon()
        CIDR = subnet(int_ip, netmask)
        #scope_definition(iface, CIDR)
        if options.fast == True:
            full_thread_scanner(CIDR,options.intensity)
        else:
            full_scanner(CIDR, options.intensity)
        print bcolors.TITLE + "All scripts completed. Check the /Results directory" + bcolors.ENDC
    elif options.attacktype == '-S' or options.attacktype == '--sniffer':
        iface = options.iface
        packets = options.packets
        subprocess.call('clear', shell=True)
        sniffer(iface, packets)
Esempio n. 3
0
def warberry():

    start_time = time.time()
    #move previous files in /Results
    move_files(int(start_time))
    delete_files()
    version = bcolors.TITLE + ('''
 _    _  ___  ____________ ___________________   __
| |  | |/ _ \ | ___ \ ___ \  ___| ___ \ ___ \ \ / /
| |  | / /_\ \| |_/ / |_/ / |__ | |_/ / |_/ /\ V /
| |/\| |  _  ||    /| ___ \  __||    /|    /  \ /
\  /\  / | | || |\ \| |_/ / |___| |\ \| |\ \  | |
 \/  \/\_| |_/\_| \_\____/\____/\_| \_\_| \_| \_/

            TACTICAL EXPLOITATION

v5                                @sec_groundzero
                          [email protected]
''') + bcolors.ENDC

    parser = OptionParser(usage="usage: sudo %prog [options]", version=version)
    parser.add_option("-a",
                      "--attack",
                      action="store",
                      dest="attacktype",
                      default="-A",
                      help="Attack Mode." + bcolors.WARNING +
                      " Default: --attack" + bcolors.ENDC)
    parser.add_option("-p",
                      "--packets",
                      action="store",
                      dest="packets",
                      default=20,
                      type=int,
                      help="# of Network Packets to capture" +
                      bcolors.WARNING + " Default: 20" + bcolors.ENDC)
    parser.add_option("-x",
                      "--expire",
                      action="store",
                      dest="expire",
                      default=20,
                      type=int,
                      help="Time for packet capture to stop" +
                      bcolors.WARNING + " Default: 20s" + bcolors.ENDC)
    parser.add_option(
        "-I",
        "--interface",
        action="store",
        dest="iface",
        default="eth0",
        help="Network Interface to use." + bcolors.WARNING + " Default: eth0" +
        bcolors.ENDC,
        choices=['eth0', 'eth1', 'wlan0', 'wlan1', 'wlan2', 'at0'])
    parser.add_option("-N",
                      "--name",
                      action="store",
                      dest="name",
                      default="WarBerry",
                      help="Hostname to use." + bcolors.WARNING +
                      " Default: Auto" + bcolors.ENDC)
    parser.add_option("-i",
                      "--intensity",
                      action="store",
                      dest="intensity",
                      default="-T1",
                      help="Port scan intensity." + bcolors.WARNING +
                      " Default: T1" + bcolors.ENDC,
                      choices=['-T1', '-T2', '-T3', '-T4'])
    parser.add_option("-P",
                      "--poison",
                      action="store_false",
                      dest="poison",
                      default=True,
                      help="Turn Poisoning off." + bcolors.WARNING +
                      " Default: On" + bcolors.ENDC)
    parser.add_option("-t",
                      "--time",
                      action="store",
                      dest="time",
                      default=900,
                      type=int,
                      help="Responder Timeout Seconds")
    parser.add_option("-Q",
                      "--quick",
                      action="store_true",
                      dest="fast",
                      default=False,
                      help="Scan using threads." + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-H",
                      "--hostname",
                      action="store_false",
                      dest="hostname",
                      default=True,
                      help="Do not change WarBerry hostname" +
                      bcolors.WARNING + " Default: Off" + bcolors.ENDC)
    parser.add_option("-e",
                      "--enumeration",
                      action="store_true",
                      dest="enum",
                      default=False,
                      help="Disable enumeration mode." + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-M",
                      "--malicious",
                      action="store_true",
                      dest="malicious",
                      default=False,
                      help="Enable Malicious only mode" + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-B",
                      "--bluetooth",
                      action="store_true",
                      dest="btooth",
                      default=False,
                      help="Enable Bluetooth Scanning" + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-W",
                      "--wifi",
                      action="store_true",
                      dest="wifi",
                      default=False,
                      help="Enable WiFi Scanning" + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-r",
                      "--recon",
                      action="store_true",
                      dest="reconmode",
                      default=False,
                      help="Enable Recon only mode. " + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-S",
                      "--sniffer",
                      action="store_true",
                      dest="sniffer",
                      default=False,
                      help="Enable Sniffer only mode." + bcolors.WARNING +
                      " Default: Off" + bcolors.ENDC)
    parser.add_option("-C",
                      "--clear",
                      action="store_true",
                      dest="clear",
                      default=False,
                      help="Clear previous output folders in ../Results")
    parser.add_option("-m",
                      "--man",
                      action="store_true",
                      dest="manpage",
                      default=False,
                      help="Print WarBerry man pages")

    (options, args) = parser.parse_args()

    if options.clear == True:
        clear_output()
    elif options.manpage == True:
        subprocess.call('clear', shell=True)
        banner_full_help()
    elif options.attacktype == "-A" or options.attacktype == '--attack':
        subprocess.call('clear', shell=True)
        banner()
        if not os.geteuid() == 0:
            print bcolors.FAIL + '*** You are not running as root and some modules will fail ***\nRun again with sudo.' + bcolors.ENDC
            sys.exit(-1)
        dhcp_check()
        if (os.path.isfile('/sys/class/net/' + options.iface +
                           '/carrier') == True):
            iface = options.iface
        else:
            for ifaces in os.listdir("/sys/class/net/"):
                if ifaces[0] == "e":
                    file_iface = open("/sys/class/net/" + ifaces + "/carrier")
                    if file_iface.readline()[0] == "1":
                        iface = ifaces
        host_name = options.name
        int_ip = iprecon(iface)
        if (int_ip == None):
            exit
        else:
            if options.malicious == True:
                netmask = netmask_recon(iface)
                with open('../Results/running_status', 'w') as status:
                    status.write("<root>")
                    status.write("Entering poisoning mode\n")
                    poison_time = options.time
                    poison(iface, poison_time)
                    status.write("</root>")
            else:
                netmask = netmask_recon(iface)
                CIDR = subnet(int_ip, netmask)
                status_str = str(scope_definition(iface, CIDR))
                packets = options.packets
                expire = options.expire
                status_str += str(sniffer(iface, packets, expire))
                status_str += str(hostnames(CIDR))
                status_str += str(nbtscan(CIDR))
                with open('../Results/running_status', 'w') as status:
                    status.write(status_str)
                if host_name != "WarBerry":
                    manual_namechange(host_name)
                if options.hostname == True and host_name == "WarBerry":
                    namechange()
                if options.reconmode == False:
                    intensity = options.intensity
                    status_str = ""
                    if options.fast == False:
                        status_str += str(
                            single_port_scanner(CIDR, intensity, iface))
                    else:
                        status_str += str(
                            thread_port_scanner(CIDR, intensity, iface))
                    if options.enum == False:
                        status_str += str(shares_enum(iface))
                        status_str += str(smb_users(iface))
                        status_str += str(webs_prep())
                        status_str += str(http_title_enum(iface))
                        status_str += str(nfs_enum(iface))
                        status_str += str(waf_enum(iface))
                        status_str += str(robots_txt())
                        status_str += str(mysql_enum(iface))
                        status_str += str(mssql_enum(iface))
                        status_str += str(ftp_enum(iface))
                        #status_str +=str(snmp_enum(iface))
                        status_str += str(sip_methods_enum(iface))
                        status_str += str(sip_users_enum(iface))
                        status_str += str(os_enum(CIDR, iface))

                        #enum4linux()
                        #with open('../Results/running_status', 'a') as status:
                        #status.write("Completed enum4linux Enumeration\n")
                        status_str += str(zone_transfers(CIDR, iface))

                        with open('../Results/running_status', 'a') as status:
                            status.write(status_str)
                    if options.btooth == True:
                        bluetooth_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed bluetooth scan\n")
                    if options.wifi == True:
                        wifi_enum()
                        with open('../Results/running_status', 'a') as status:
                            status.write("Completed wifi networks scan\n")
                    print ""
                print bcolors.TITLE + "All scripts completed. Check the /Results directory" + bcolors.ENDC
                print " "
                if options.poison == True:
                    with open('../Results/running_status', 'a') as status:
                        status.write("Entering poisoning mode\n")
                        poison_time = options.time
                        poison(iface, poison_time)
    elif options.attacktype == '-S' or options.attacktype == '--sniffer':
        status_str = ""
        iface = options.iface
        packets = options.packets
        subprocess.call('clear', shell=True)
        status_str += str(sniffer(iface, packets))

    create_xmls()
    encrypt_files()

    #Sytem exit due to finish.
    print bcolors.TITLE + "Warberry is now finished. The system will now exit.\n" + bcolors.ENDC
    print bcolors.TITLE + "Time of execution: " + "--- %s seconds ---\n" % (
        time.time() - start_time) + bcolors.ENDC
    sys.exit(0)
 def bluetooth(self,status, blue,war_db):
     if blue == True:
         self.bluetooths = bluetooth_enum()
         war_db.updateStatus("Completed Bluetooth Scan")
         status.warberryOKGREEN("Completed Bluetooth Scan")
 def bluetooth(self, status, blue, war_db):
     if blue == True:
         self.bluetooths = bluetooth_enum()
         war_db.updateStatus("Completed Bluetooth Scan")
         status.warberryOKGREEN("Completed Bluetooth Scan")