def __init__(self): cmd.Cmd.__init__(self) self.enabled_modules = enabled_modules self.target_num = 1 self.port = 22 self.targets = {} self.curtarget = None proc = subprocess.Popen( ["ifconfig | grep inet | head -n1 | cut -d\ -f12 | cut -d: -f2"], stdout=subprocess.PIPE, shell=True ) self.localIP = proc.stdout.read() if six.PY3: self.localIP = str(self.localIP[:-1], "utf-8") else: self.localIP = self.localIP[:-1].encode("ascii", "ignore").decode("ascii") self.ctrlc = False ascii() print( 'Welcome to BackdoorMe, a powerful backdooring utility. Type "help" to see the list of available commands.' ) print('Type "addtarget" to set a target, and "open" to open an SSH connection to that target.') print("Using local IP of %s." % self.localIP) self.addtarget("10.1.0.5", "student", "target123")
def __init__(self): cmd.Cmd.__init__(self) self.core = core.PinaColada() self.localIP = self.core.get_local_ip() self.ctrlc = False ascii() print "Welcome to Pina Colada, a powerful Wifi Pineapple. Type \"help\" to see the list of available commands." print "Packets are being stored in the packets directory."
def __init__(self): cmd.Cmd.__init__(self) self.target_num = 1 self.port = 22; #change this if the port is different, almost never necessary self.targets = {} self.curtarget = None proc = subprocess.Popen(["ifconfig | grep inet | head -n1 | cut -d\ -f12 | cut -d: -f2"], stdout=subprocess.PIPE, shell=True) self.localIP = proc.stdout.read() self.localIP = self.localIP[:-1] ascii() print "Welcome to BackdoorMe, a backdooring utility. Type \"help\" to see the list of available commands." print "Type \"addtarget\" to set a target, and \"open\" to open an SSH connection to that target." print "Using local IP of %s." % self.localIP
def __init__(self): cmd.Cmd.__init__(self) self.enabled_modules = enabled_modules self.target_num = 1 self.port = 22 self.targets = {} self.curtarget = None proc = subprocess.Popen(["ifconfig | grep inet | head -n1 | cut -d\ -f12 | cut -d: -f2"], stdout=subprocess.PIPE, shell=True) self.localIP = proc.stdout.read() self.localIP = self.localIP[:-1] self.ctrlc = False ascii() print "Welcome to BackdoorMe, a powerful backdooring utility. Type \"help\" to see the list of available commands." print "Type \"addtarget\" to set a target, and \"open\" to open an SSH connection to that target." print "Using local IP of %s." % self.localIP self.addtarget("10.1.0.5", "student", "target123")
def __init__(self): cmd.Cmd.__init__(self) self.target_num = 1 self.port = 22 #change this if the port is different, almost never necessary self.targets = {} self.curtarget = None proc = subprocess.Popen( ["ifconfig | grep inet | head -n1 | cut -d\ -f12 | cut -d: -f2"], stdout=subprocess.PIPE, shell=True) self.localIP = proc.stdout.read() self.localIP = self.localIP[:-1] ascii() print "Welcome to BackdoorMe, a backdooring utility. Type \"help\" to see the list of available commands." print "Type \"addtarget\" to set a target, and \"open\" to open an SSH connection to that target." print "Using local IP of %s." % self.localIP