Пример #1
0
def startup():
	# Parse commandline arguments
	logger('Big Iron Recon & Pwnage (BIRP) by @singe',kind='info')
	if not results.target:
		logger('Manual target selection chosen.',kind='info')
	else:
		logger('Target Acquired\t\t: ' + results.target,kind='info')
	logger('Slowdown is\t\t\t: ' + str(results.sleep),kind='info')
	logger('Attack platform\t\t: ' + platform.system(),kind='info')
	
	if not platform.system() == 'Windows':
		em = WrappedEmulator(visible=True,delay=results.sleep)
	elif platform.system() == 'Windows':
		logger('x3270 not supported on Windows',kind='err')
		sys.exit(1)
	if results.quiet:
		logger('Quiet Mode Enabled\t: Shhhhhhhhh!',kind='warn')
	history = tn3270.History()
	if results.loadfile:
		logger('Load history from\t\t: ' + results.loadfile,kind='info')
		history = load_history(results.loadfile)

	return (em,history)
Пример #2
0
		whine('Password Bruting\t\t: Enabled',kind='info')
		whine('Passwords File\t\t: ' + results.passfile,kind='info')
		passfile=open(results.passfile) #open the passwords file
elif results.cics:
	whine('CICS Bruting\t\t: Enabled',kind='info')
	transfile=open(results.transfile) #open the transid file
	#whine('CICS Bruting not done yet...',kind='err')
	#sys.exit(1)
	
whine('Slowdown is\t\t\t: ' + str(results.sleep),kind='info')
whine('Attack platform\t\t: ' + platform.system(),kind='info')

if results.movie_mode and not platform.system() == 'Windows':
	whine('ULTRA Hacker Movie Mode\t: Enabled',kind='info')
	#Enables Movie Mode which uses x3270 so it looks all movie like
	em = WrappedEmulator(visible=True,delay=results.sleep)
elif results.movie_mode and platform.system() == 'Windows':
	whine('ULTRA Hacker Movie Mode not supported on Windows',kind='warn')
	em = WrappedEmulator(visible=False,delay=results.sleep)
else:
	whine('ULTRA Hacker Movie Mode\t: Disabled',kind='info')
	em = WrappedEmulator(visible=False,delay=results.sleep)
if results.quiet:
	whine('Quiet Mode Enabled\t: Shhhhhhhhh!',type='warn')

connect_zOS(em,results.target) #connect to the host

# Perform a VTAM APPLID brute
if results.vtam and check_VTAM(em):
	brute_APPLID(em,results,appfile)
	appfile.close()
Пример #3
0
parser.add_argument('-t', '--target', help='Target IP address or Hostname and port: TARGET[:PORT] default port is 23', required=True, dest='target')
parser.add_argument('-s', '--sleep', help='Seconds to sleep between actions (increase on slower systems). The default is 0 seconds.', default=0.1, type=float, dest='sleep')
parser.add_argument('-m', '--moviemode', help='Enables ULTRA AWESOME Movie Mode. Watch the system get hacked in real time!', default=False, dest='movie_mode', action='store_true')
parser.add_argument('-q', '--quiet', help='Be more quieter', default=False, dest='quiet', action='store_true')
results = parser.parse_args()

# Parse commandline arguments
whine('z/OS Mainframe Screenshotter',kind='info')
whine('Target Acquired\t\t: ' + results.target,kind='info')
whine('Slowdown is\t\t\t: ' + str(results.sleep),kind='info')
whine('Attack platform\t\t: ' + platform.system(),kind='info')

if results.movie_mode and not platform.system() == 'Windows':
	whine('ULTRA Hacker Movie Mode\t: Enabled',kind='info')
	#Enables Movie Mode which uses x3270 so it looks all movie like 'n shit
	em = WrappedEmulator(visible=True)
elif results.movie_mode and platform.system() == 'Windows':
	whine('ULTRA Hacker Movie Mode not supported on Windows',kind='warn')
	em = WrappedEmulator()
else:
	whine('ULTRA Hacker Movie Mode\t: Disabled',kind='info')
	em = WrappedEmulator(visible=False)
if results.quiet:
	whine('Quiet Mode Enabled\t: Shhhhhhhhh!',type='warn')

connect_zOS(em,results.target) #connect to the host
time.sleep(results.sleep)
em.save_screen(results.target+'.html')

# And we're done. Close the connection
em.terminate()
Пример #4
0
        'Checks wether you can impersonate another user when submitting a job',
        default=False,
        dest='surrogat_user')
    parser.add_argument(
        '-s',
        '--submit',
        help=
        'Submit JCL to CICS server. Specify: dummy,reverse,custom (need -j option),cicsshell',
        dest='submit')
    parser.add_argument(
        '--queue',
        help='Provides the name of the TD queue to submit a JOB',
        dest='queue')

    parser.add_argument(
        '-l',
        '--lhost',
        help='Remote server to call back to for reverse shell (host:port)',
        dest='lhost')
    parser.add_argument('-j',
                        '--jcl',
                        help='Custom JCL file to provide',
                        dest='jcl')

    results = parser.parse_args()

    em = WrappedEmulator(False)
    connect_zOS(em, results.IP + ":" + results.PORT)

    main(results)
Пример #5
0
                    help='Be more quieter',
                    default=False,
                    dest='quiet',
                    action='store_true')
results = parser.parse_args()

# Parse commandline arguments
whine('z/OS Mainframe Screenshotter', kind='info')
whine('Target Acquired\t\t: ' + results.target, kind='info')
whine('Slowdown is\t\t\t: ' + str(results.sleep), kind='info')
whine('Attack platform\t\t: ' + platform.system(), kind='info')

if results.movie_mode and not platform.system() == 'Windows':
    whine('ULTRA Hacker Movie Mode\t: Enabled', kind='info')
    #Enables Movie Mode which uses x3270 so it looks all movie like 'n shit
    em = WrappedEmulator(visible=True)
elif results.movie_mode and platform.system() == 'Windows':
    whine('ULTRA Hacker Movie Mode not supported on Windows', kind='warn')
    em = WrappedEmulator()
else:
    whine('ULTRA Hacker Movie Mode\t: Disabled', kind='info')
    em = WrappedEmulator(visible=False)
if results.quiet:
    whine('Quiet Mode Enabled\t: Shhhhhhhhh!', type='warn')

connect_zOS(em, results.target)  #connect to the host
time.sleep(results.sleep)
em.save_screen(results.target + '.html')

# And we're done. Close the connection
em.terminate()
Пример #6
0
        whine('Password Bruting\t\t: Enabled', kind='info')
        whine('Passwords File\t\t: ' + results.passfile, kind='info')
        passfile = open(results.passfile)  #open the passwords file
elif results.cics:
    whine('CICS Bruting\t\t: Enabled', kind='info')
    transfile = open(results.transfile)  #open the transid file
    #whine('CICS Bruting not done yet...',kind='err')
    #sys.exit(1)

whine('Slowdown is\t\t\t: ' + str(results.sleep), kind='info')
whine('Attack platform\t\t: ' + platform.system(), kind='info')

if results.movie_mode and not platform.system() == 'Windows':
    whine('ULTRA Hacker Movie Mode\t: Enabled', kind='info')
    #Enables Movie Mode which uses x3270 so it looks all movie like
    em = WrappedEmulator(visible=True, delay=results.sleep)
elif results.movie_mode and platform.system() == 'Windows':
    whine('ULTRA Hacker Movie Mode not supported on Windows', kind='warn')
    em = WrappedEmulator(visible=False, delay=results.sleep)
else:
    whine('ULTRA Hacker Movie Mode\t: Disabled', kind='info')
    em = WrappedEmulator(visible=False, delay=results.sleep)
if results.quiet:
    whine('Quiet Mode Enabled\t: Shhhhhhhhh!', type='warn')

connect_zOS(em, results.target)  #connect to the host

# Perform a VTAM APPLID brute
if results.vtam and check_VTAM(em):
    brute_APPLID(em, results, appfile)
    appfile.close()