예제 #1
0
파일: DNS.py 프로젝트: raystyle/Responder3
	def __init__(self, listener_socket_config, settings, log_queue):
		ResponderServerGlobalSession.__init__(self, log_queue, self.__class__.__name__)
		self.listener_socket_config = listener_socket_config
		self.settings = settings
		self.spooftable = collections.OrderedDict()
		self.poisonermode = PoisonerMode.ANALYSE

		self.parse_settings()
예제 #2
0
파일: NTP.py 프로젝트: dnoiz1/Responder3
	def __init__(self, listener_socket_config, settings, log_queue):
		ResponderServerGlobalSession.__init__(self, log_queue, self.__class__.__name__)
		self.listener_socket_config = listener_socket_config
		self.settings = settings

		self.refid = ipaddress.IPv4Address('127.0.0.1')
		self.faketime = datetime.datetime.now()

		self.parse_settings()
예제 #3
0
    def __init__(self, listener_socket_config, settings, log_queue):
        ResponderServerGlobalSession.__init__(self, log_queue,
                                              self.__class__.__name__)
        self.listener_socket_config = listener_socket_config
        self.settings = settings
        self.sessions = {}
        self.assigned_ips = {}  #xid - ip
        self.offer_mac = {}
        self.ip_pool = None  #ipaddress.IPv4Network

        self.parse_settings()
예제 #4
0
	def __init__(self, listener_socket_config, settings, log_queue):
		ResponderServerGlobalSession.__init__(self, log_queue, self.__class__.__name__)
		self.listener_socket_config = listener_socket_config
		self.settings = settings

		self.spooftable = []
		self.poisonermode = PoisonerMode.ANALYSE

		self.maddr = ('224.0.0.251' , self.listener_socket_config.bind_port)
		if self.listener_socket_config.bind_addr.version == 6:
			self.maddr = ('FF02::FB' , self.listener_socket_config. bind_port,0, self.listener_socket_config.bind_iface_idx)

		self.parse_settings()