コード例 #1
0
def usage():

    sdnpwn.addUsage("-t | --target",
                    "Network or host address (i.e. 192.168.1.0/24)", True)
    sdnpwn.addUsage("-p | --port",
                    "Ports to connect to (Default is 6633,6634,6653)")
    sdnpwn.addUsage("-v | --verbose", "Enable verbose output")
    sdnpwn.addUsage("-s | --socket-timeout",
                    "Timeout for connection in seconds (Default is 2)")
    sdnpwn.addUsage("-c | --count", "Number of messages to send")
    sdnpwn.addUsage("-d | --delay", "Delay between messages")

    sdnpwn.addUsage("--hold-open", "Keep socket open after sending message")

    sdnpwn.addUsage("--hello", "Send OF Hello message")
    sdnpwn.addUsage("--echo-request", "Send an OF Echo Request")

    sdnpwn.addUsage("--packet-in", "Send an OF packet-in")
    sdnpwn.addUsage(" --xid", "XID for OF header")
    sdnpwn.addUsage(" --buffer-id", "Buffer ID for packet-in")
    sdnpwn.addUsage(" --total-length",
                    "Length of data in packet-in (Calculated by default)")
    sdnpwn.addUsage(" --in-port", "Port packet was received on")
    sdnpwn.addUsage(" --reason",
                    "Reason for packet-in. Can be 'match' or 'action'")
    sdnpwn.addUsage(" --data-raw", "Packet-in data as hex")
    sdnpwn.addUsage(
        " --data-scapy",
        "Packet-in data as scapy object (i.e. Ether()/IP()/TCP())")

    return sdnpwn.getUsage()
コード例 #2
0
def usage():
  
  sdnpwn.addUsage(["-c", "--configure"], "Configure app before building", False)
  sdnpwn.addUsage(["-b", "--build"], "Root directory of app to build", True)
  sdnpwn.addUsage(["-k", "--keep-source"], "Keep source of generated application", False)
  
  return sdnpwn.getUsage()
コード例 #3
0
def usage():
  
  sdnpwn.addUsage(["--target", "-t"], "Target", True)
  sdnpwn.addUsage(["--listen", "-l"], "Listening socket (like 127.0.0.1:1234)", True)
  sdnpwn.addUsage(["--no-local", "-r"], "Do not start a local shell listener. Use if using nc, metasploit, etc to get shell", True)
  
  return sdnpwn.getUsage()
コード例 #4
0
ファイル: mods.py プロジェクト: wizard2773/sdnpwn
def usage():
    sdnpwn.addUsage("-l", "List all available modules")
    sdnpwn.addUsage("-s", "Search available modules")
    sdnpwn.addUsage("-n", "Create new module from base template")
    sdnpwn.addUsage("-t", "Specify template for new module (Optional with -n)")
    sdnpwn.addUsage("-r", "Delete module by name")

    return sdnpwn.getUsage()
コード例 #5
0
def usage():
  
  sdnpwn.addUsage("--iface", "Interface to use", True)
  sdnpwn.addUsage("--target", "IP address of target host", True)
  sdnpwn.addUsage("--loop", "Continue poisoning until stopped")
  sdnpwn.addUsage("--delay", "Delay between packets when looping")
  
  return sdnpwn.getUsage()
コード例 #6
0
def usage():
    sdnpwn.addUsage(["-t", "--target"], "IP address of controller", True)
    sdnpwn.addUsage(["-p", "--port"], "Websocket port (Default 8181)", False)
    sdnpwn.addUsage(
        ["-c", "--cookie"],
        "Add cookie (like 'JSESSIONID=1sz99uvm1z2971t18f55lmpc0d')", False)

    return sdnpwn.getUsage()
コード例 #7
0
def usage():
    sdnpwn.addUsage("--iface", "Interface to use", True)
    sdnpwn.addUsage("--target", "Target network (e.g. 192.168.1.0/24)", True)
    sdnpwn.addUsage("--phantom-ip", "IP to give the Phantom Host", True)
    sdnpwn.addUsage("--phantom-mac", "MAC address to give the Phantom Host")
    sdnpwn.addUsage("--packets", "Number of packets to send during the attack",
                    True)

    return sdnpwn.getUsage()
コード例 #8
0
ファイル: of_scan.py プロジェクト: vickyyang5454/sdnpwn
def usage():
    sdnpwn.addUsage(["--target", "-t"],
                    "Set target IP or network (192.168.0.0/24)", True)
    sdnpwn.addUsage(["--port", "-p"],
                    "Set ports to scan(e.g. 6633,6653 || 6000-7000)", True)
    sdnpwn.addUsage(["--socket-timeout", "-s"],
                    "Set timeout for socket connections", False)

    return sdnpwn.getUsage()
コード例 #9
0
def usage():

    sdnpwn.addUsage(["-t", "--target"], "ONOS IP", True)
    sdnpwn.addUsage(["-p", "--port"], "ONOS web UI port (default 8181)", False)
    sdnpwn.addUsage(
        ["-a", "--app"],
        "Location of application to upload. Expects '.oar' file-type.", True)

    return sdnpwn.getUsage()
コード例 #10
0
def usage():
  '''
  How to use the module. This function should return a string.
  sdnpwn_common contains functions to print the module usage in a table. 
  These functions are "addUsage", "getUsage", and "printUsage". "addUsage" and "getUsage" are shown below.
  The parameters for addUsage are option, option description, and required (True or False)
  '''
  sdnpwn.addUsage("-v", "Enable verbose output", False)
  
  return sdnpwn.getUsage()
コード例 #11
0
def usage():
  
  sdnpwn.addUsage("-i | --iface", "Interface to use")
  sdnpwn.addUsage("-l | --lldp", "Determine controller based off LLDP traffic")
  sdnpwn.addUsage("-t | --target", "Determine controller based northbound interface")
  sdnpwn.addUsage("-p | --ports", "Set ports to scan when --target is specified.")
  sdnpwn.addUsage("-x | --proxy", "Define a proxy server to use when --target is specified.")
  sdnpwn.addUsage("-v | --verbose", "Show verbose output")
   
  return sdnpwn.getUsage()
コード例 #12
0
def usage():
  sdnpwn.addUsage(["-t", "--target"], "IP address of controller", True)
  sdnpwn.addUsage(["-p", "--port"], "Websocket port (Default 8181)", False)
  sdnpwn.addUsage(["-c", "--cookie"], "Add cookie (like 'JSESSIONID=1sz99uvm1z2971t18f55lmpc0d')", False)
  sdnpwn.addUsage(["-s", "--summary"], "Request Summary events", False)
  sdnpwn.addUsage(["-d", "--topo"], "Request Topology events", False)
  sdnpwn.addUsage(["-b", "--pretty"], "Print event information in a human readable format", False)
  
  #sdnpwn.addUsage(["-k", "--keep-alive"], "Keep websocket open and receive new events", False)
  
  return sdnpwn.getUsage()
コード例 #13
0
def usage():

    sdnpwn.addUsage("--iface", "Interface to use", True)
    sdnpwn.addUsage("--target-ip", "IP address of target", True)
    sdnpwn.addUsage("--target-mac", "MAC address of target")
    sdnpwn.addUsage("--ports",
                    "Ports to scan. Seperate with comma (e.g. 22,23,80)", True)
    sdnpwn.addUsage("--phantom-ip", "IP address to give Phantom Host", True)
    sdnpwn.addUsage("--phantom-mac", "MAC address to give Phantom Host")

    return sdnpwn.getUsage()
コード例 #14
0
ファイル: dp_mitm.py プロジェクト: yeshuopp123/sdnpwn
def usage():

    sdnpwn.addUsage("--iface", "Interface to use", True)
    sdnpwn.addUsage("--target1", "IP address for first target", True)
    sdnpwn.addUsage("--target1-mac", "MAC address for first target")
    sdnpwn.addUsage("--gateway", "Use network gateway as second target")
    sdnpwn.addUsage(
        "--target2",
        "IP address for  second target (Required without -g option)")
    sdnpwn.addUsage("--target2-mac", "MAC address for second target")

    return sdnpwn.getUsage()
コード例 #15
0
ファイル: sdn_detect.py プロジェクト: yeshuopp123/sdnpwn
def usage():
    sdnpwn.addUsage("-m", "Protocol to use (ICMP | ARP) (Default ARP)")
    sdnpwn.addUsage(
        "-t",
        "IP of local host to send traffic to (Defaults to default gateway)")
    sdnpwn.addUsage("-i", "Interval at which packets are sent (Default 1)")
    sdnpwn.addUsage(
        "-c",
        "Number of packets to send. More packets means better detection accuracy.(Default 10)"
    )
    sdnpwn.addUsage("-v", "Enable verbose output")

    return sdnpwn.getUsage()
コード例 #16
0
def usage():

    sdnpwn.addUsage("-i | --iface", "Interface to use", True)
    sdnpwn.addUsage("-v | --victim", "IP address of victim", True)
    sdnpwn.addUsage("-vM| --victim-mac", "MAC address of victim")
    sdnpwn.addUsage("-t | --target-ip",
                    "IP address to poisin in vicims ARP cache", True)
    sdnpwn.addUsage("-m | --mac", "MAC address to insert in the victims cache",
                    True)
    sdnpwn.addUsage("-l | --loop", "Continue poisoning until stopped")
    sdnpwn.addUsage("-d | --delay", "Delay between packets when looping")

    return sdnpwn.getUsage()
コード例 #17
0
ファイル: lfa_scapy.py プロジェクト: yeshuopp123/sdnpwn
def usage():

    sdnpwn.addUsage("--iface1", "Set network interface 1", True)
    sdnpwn.addUsage("--iface2", "Set network interface 2", True)
    sdnpwn.addUsage(
        "--script",
        "Pass traffic through a custom script. Provide script location.")
    sdnpwn.addUsage(
        "--dos",
        "Only forward LLDP traffic and create a 'black hole' for other traffic"
    )
    sdnpwn.addUsage("--verbose", "Get more output")

    return sdnpwn.getUsage()
コード例 #18
0
def usage():
    '''
  How to use the module. This function should return a string.
  sdnpwn_common contains functions to print the module usage in a table. 
  These functions are "addUsage", "getUsage", and "printUsage". "addUsage" and "getUsage" are shown below.
  The parameters for addUsage are option, option description, and required (True or False)
  '''
    sdnpwn.addUsage("-i | --iface", "Interface to use", True)
    sdnpwn.addUsage("-c | --count", "Times to replay (Default 1)", False)
    sdnpwn.addUsage("-w | --capture", "Capture LLDP frame to file", False)
    sdnpwn.addUsage("-r | --replay", "Replay captured LLDP frame from file",
                    False)

    return sdnpwn.getUsage()
コード例 #19
0
def usage():

    sdnpwn.addUsage("-i | --iface", "Interface to use")
    sdnpwn.addUsage("-l | --lldp",
                    "Determine controller based off LLDP traffic")
    sdnpwn.addUsage("-d | --dump-lldp",
                    "Dump the contents of the LLDP message")
    sdnpwn.addUsage("-n | --ignore-content",
                    "Do not detect controller based on LLDP content")
    sdnpwn.addUsage("-t | --target",
                    "Determine controller based northbound interface")
    sdnpwn.addUsage("-p | --ports",
                    "Set ports to scan when --target is specified.")
    sdnpwn.addUsage(
        "-x | --proxy",
        "Define a proxy server to use when --target is specified.")
    sdnpwn.addUsage("-v | --verbose", "Show verbose output")

    return sdnpwn.getUsage()
コード例 #20
0
ファイル: of_switch.py プロジェクト: yeshuopp123/sdnpwn
def usage():
    '''
  How to use the module. This function should return a string.
  sdnpwn_common contains functions to print the module usage in a table. 
  These functions are "addUsage", "getUsage", and "printUsage". "addUsage" and "getUsage" are shown below.
  The parameters for addUsage are option, option description, and required (True or False)
  '''
    sdnpwn.addUsage("-c | --controller",
                    "IP address of controller (Default 127.0.0.1)", False)
    sdnpwn.addUsage("-p | --port",
                    "Openflow port on controller (Default 6633)", False)
    sdnpwn.addUsage("-r | --config", "Switch configuration file to use", True)
    sdnpwn.addUsage("-l | --listen", "Port for switch relay proxy", False)
    sdnpwn.addUsage("-o | --output-to",
                    "Interface to forward packet out message payloads", False)
    sdnpwn.addUsage("-f | --output-filter",
                    "Filter packets by output port. Use with -o", False)
    sdnpwn.addUsage("-v | --verbose", "Enable verbose output", False)

    return sdnpwn.getUsage()
コード例 #21
0
def usage():

    sdnpwn.addUsage("--iface1", "Set network interface 1", True)
    sdnpwn.addUsage("--iface2", "Set network interface 2", True)
    sdnpwn.addUsage("--relay", "Set relay method (bridge | tunnel)", True)
    sdnpwn.addUsage("--bridge-name", "Set name for bridge (Default is 'br0')")
    sdnpwn.addUsage(
        "--stp",
        "Allow spanning tree protocol traffic (on | off) (Default 'on')")
    sdnpwn.addUsage(
        "--tunnel-local",
        "IP address for local tunnel interface (Required for tunnel relay method)"
    )
    sdnpwn.addUsage(
        "--tunnel-remote",
        "IP address for remote tunnel interface (Required for tunnel relay method)"
    )
    sdnpwn.addUsage(
        "--bridge-ip",
        "IP address to use for bridge interface (Default '10.10.10.1/24')")

    return sdnpwn.getUsage()
コード例 #22
0
ファイル: help.py プロジェクト: vickyyang5454/sdnpwn
def usage():

    sdnpwn.addUsage("", "", False)

    return sdnpwn.getUsage()
コード例 #23
0
def usage():
    sdnpwn.addUsage(["-i", "--iface"], "Interface to use (Default eth0)",
                    False)
    sdnpwn.addUsage(["-v", "--verbose"], "Enable verbose output", False)

    return sdnpwn.getUsage()
コード例 #24
0
ファイル: of_mon.py プロジェクト: vickyyang5454/sdnpwn
def usage():
    sdnpwn.addUsage(["-i", "--iface"], "Interface to listen on", True)

    return sdnpwn.getUsage()
コード例 #25
0
def usage():

    sdnpwn.addUsage("-i | --iface", "Interface to use", True)
    sdnpwn.addUsage("-m | --mode", "Set mode ( watch or map )", True)

    return sdnpwn.getUsage()