def ul(): jar_file = 'UpdateLocation.jar' try: updateLocation = check_call( ['java', '-jar', os.path.join(ul_path, jar_file)]) if updateLocation == 0: it = input( '\nWould you like to go back to Interception Menu? (y/n): ') if it == 'y' or it == 'yes': ss7main.ss7interception() elif it == 'n' or it == 'no': attack_menu = input( 'Would you like to choose another attacks category? (y/n): ' ) if attack_menu == 'y' or attack_menu == 'yes': ss7main.attacksMenu() elif attack_menu == 'n' or attack_menu == 'no': main_menu = input( 'Would you like to go back to the main menu? (y/exit): ' ) if main_menu == 'y' or main_menu == 'yes': sigploit.mainMenu() elif main_menu == 'exit': print('TCAP End...') time.sleep(1) sys.exit(0) except CalledProcessError as e: print("\033[31m[-]Error:\033[0m%s Failed to Launch, %s" % (jar_file, e.message)) time.sleep(2) ss7main.ss7interception()
def cl(): jar_file = 'CancelLocation.jar' try: cancelLocation = check_call(['java', '-jar', os.path.join(cl_path, jar_file)]) if cancelLocation == 0: fr = raw_input('\nWould you like to go back to Fraud Menu? (y/n): ') if fr == 'y' or fr == 'yes': ss7main.Fraud() elif fr == 'n' or fr == 'no': attack_menu = raw_input('Would you like to choose another attacks category? (y/n): ') if attack_menu == 'y' or attack_menu == 'yes': ss7main.attacksMenu() elif attack_menu == 'n' or attack_menu == 'no': main_menu = raw_input('Would you like to go back to the main menu? (y/exit): ') if main_menu == 'y' or main_menu == 'yes': sigploit.mainMenu() elif main_menu == 'exit': print 'TCAP End...' sys.exit(0) except CalledProcessError as e: print "\033[31m[-]Error:\033[0mCancelLocation Failed to Launch, " + str(e) time.sleep(2) ss7main.Fraud()
def purge(): jar_file = 'PurgeMS.jar' try: purgeMS = check_call(['java','-jar', os.path.join(purge_path,jar_file)]) if purgeMS == 0: ds = raw_input('\nWould you like to go back to Fraud Menu? (y/n): ') if ds == 'y' or ds == 'yes': ss7main.DoS() elif ds == 'n' or ds == 'no': attack_menu = raw_input('Would you like to choose another attacks category? (y/n): ') if attack_menu == 'y'or attack_menu =='yes': ss7main.attacksMenu() elif attack_menu == 'n' or attack_menu =='no': main_menu = raw_input('Would you like to go back to the main menu? (y/exit): ') if main_menu == 'y' or main_menu =='yes': sigploit.mainMenu() elif main_menu =='exit': print 'TCAP End...' sys.exit(0) except CalledProcessError as e: print "\033[31m[-]\033[0mError:PurgeMS Failed to Launch, " + e.message time.sleep(2) ss7main.DoS()
def attacksMenu(): os.system('clear') print " \033[34mChoose From the Below Attack Categories\033[0m ".center( 105, "#") print print "0) Location Tracking".rjust(23) print "1) Call and SMS Interception".rjust(31) print "2) Fraud & Info Gathering".rjust(28) print "3) DoS".rjust(9) print print "or type back to return to the main menu".rjust(42) print choice = raw_input( "\033[37m(\033[0m\033[2;31mattacks\033[0m\033[37m)>\033[0m ") if choice == "0": ss7tracking() elif choice == "1": ss7interception() elif choice == "2": ss7fraud() elif choice == "3": ss7dos() elif choice == "back": sigploit.mainMenu() else: print '\n\033[31m[-]Error:\033[0m Please Enter a Valid Choice (0 - 3)' time.sleep(1.5) attacksMenu()
def mtsms(): jar_file = 'MTForwardSMS.jar' try: mtForwardSMS = check_call( ['java', '-jar', os.path.join(mtsms_path, jar_file)]) if mtForwardSMS == 0: fr = raw_input( '\nWould you like to go back to Fraud Menu? (y/n): ') if fr == 'y' or fr == 'yes': ss7main.ss7fraud() elif fr == 'n' or fr == 'no': attack_menu = raw_input( 'Would you like to choose another attacks category? (y/n): ' ) if attack_menu == 'y' or attack_menu == 'yes': ss7main.attacksMenu() elif attack_menu == 'n' or attack_menu == 'no': main_menu = raw_input( 'Would you like to go back to the main menu? (y/exit): ' ) if main_menu == 'y' or main_menu == 'yes': sigploit.mainMenu() elif main_menu == 'exit': print 'TCAP End...' sys.exit(0) except CalledProcessError as e: print "\033[31m[-]Error:\033[0m%s Failed to Launch, %s" % (jar_file, e.message) time.sleep(2) ss7main.ss7fraud()
def srism(): jar_file = 'SendRoutingInfoforSM.jar' try: srism = check_call( ['java', '-jar', os.path.join(srism_path, jar_file)]) if srism == 0: lt = raw_input( '\nWould you like to go back to LocationTracking Menu? (y/n): ' ) if lt == 'y' or lt == 'yes': ss7main.ss7tracking() elif lt == 'n' or lt == 'no': attack_menu = raw_input( 'Would you like to choose another attacks category? (y/n): ' ) if attack_menu == 'y' or attack_menu == 'yes': ss7main.attacksMenu() elif attack_menu == 'n' or attack_menu == 'no': main_menu = raw_input( 'Would you like to go back to the main menu? (y/exit): ' ) if main_menu == 'y' or main_menu == 'yes': sigploit.mainMenu() elif main_menu == 'exit': print 'TCAP End...' sys.exit(0) except CalledProcessError as e: print "\033[31m[-]Error:\033[0m%s Failed to Launch, %s" % (jar_file, e.message) time.sleep(2) ss7main.ss7tracking()
def sai(): jar_file = 'SendAuthenticationInfo.jar' try: sendAuth = check_call( ['java', '-jar', os.path.join(sai_path, jar_file)]) if sendAuth == 0: fr = input('\nWould you like to go back to Fraud Menu? (y/n): ') if fr == 'y' or fr == 'yes': ss7main.ss7fraud() elif fr == 'n' or fr == 'no': attack_menu = input( 'Would you like to choose another attacks category? (y/n): ' ) if attack_menu == 'y' or attack_menu == 'yes': ss7main.attacksMenu() elif attack_menu == 'n' or attack_menu == 'no': main_menu = input( 'Would you like to go back to the main menu? (y/exit): ' ) if main_menu == 'y' or main_menu == 'yes': sigploit.mainMenu() elif main_menu == 'exit': print('TCAP End...') sys.exit(0) except CalledProcessError as e: print("\033[31m[-]Error:\033[0m%s Failed to Launch, %s" % (jar_file, e.message)) time.sleep(2) ss7main.ss7fraud()
def isd(): jar_file = 'InsertSubscriberData.jar' try: insertSD = check_call( ['java', '-jar', os.path.join(isd_path, jar_file)]) if insertSD == 0: fr = input('\nWould you like to go back to Fraud Menu? (y/n): ') if fr == 'y' or fr == 'yes': ss7main.Fraud() elif fr == 'n' or fr == 'no': attack_menu = input( 'Would you like to choose another attacks category? (y/n): ' ) if attack_menu == 'y' or attack_menu == 'yes': ss7main.attacksMenu() elif attack_menu == 'n' or attack_menu == 'no': main_menu = input( 'Would you like to go back to the main menu? (y/exit): ' ) if main_menu == 'y' or main_menu == 'yes': sigploit.mainMenu() elif main_menu == 'exit': print('TCAP End...') sys.exit(0) except CalledProcessError as e: print( "\033[31m[-]Error:\033[0mInsertSubscriberData Failed to Launch, " + str(e)) time.sleep(2) ss7main.ss7fraud()
def psi(): jar_file = 'ProvideSubscriberInfo.jar' try: psi = check_call(['java', '-jar', os.path.join(psi_path, jar_file)]) if psi == 0: lt = raw_input( '\nWould you like to go back to LocationTracking Menu? (y/n): ' ) if lt == 'y' or lt == 'yes': ss7main.ss7tracking() elif lt == 'n' or lt == 'no': attack_menu = raw_input( 'Would you like to choose another attacks category? (y/n): ' ) if attack_menu == 'y' or attack_menu == 'yes': ss7main.attacksMenu() elif attack_menu == 'n' or attack_menu == 'no': main_menu = raw_input( 'Would you like to go back to the main menu? (y/exit): ' ) if main_menu == 'y' or main_menu == 'yes': sigploit.mainMenu() elif main_menu == 'exit': print 'TCAP End...' sys.exit(0) except CalledProcessError as e: print "\033[31m[-]Error:\033[0m" + jar_file + " Failed to Launch, " + e.message time.sleep(2) ss7main.ss7tracking()
def gtpattacksv2(): os.system('clear') print(" \033[34mChoose From the Below Attack Categories\033[0m ".center( 105, "#")) print() print("0) Information Gathering".rjust(27)) print("1) Fraud".rjust(11)) print() print("or type back to return to the main menu".rjust(42)) print() choice = input( "\033[37m(\033[0m\033[2;31mattacks\033[0m\033[37m)>\033[0m ") if choice == "0": gtpinfo() elif choice == "1": gtpfraud() elif choice == 'back': sigploit.mainMenu() else: print('\n\033[31m[-]Error:\033[0m Please Enter a Valid Choice (0-1)') time.sleep(1.5) gtpattacksv2()
def prep(): print() print(" Module".rjust(10) + "\t\tDescription") print(" -------- ------------") print("0) GTPv1".rjust(8) + "\t\t3G Data attacks") print("1) GTPv2".rjust(8) + "\t\t4G Data attacks") print() print("or type back to go back to Main Menu".rjust(39)) choice = input("\033[34mgtp\033[0m\033[37m>\033[0m ") if choice == "0": print( "\n\033[34m[*]\033[0mGTPv1 will be updated in version 2.1 release.." ) print("\033[34m[*]\033[0mGoing back to GTP Menu") time.sleep(2) os.system('clear') prep() elif choice == "1": gtpattacksv2() elif choice == "back": sigploit.mainMenu()