示例#1
0
def launch_ap(iface, essid):
    Logger.info('Shutting down phishing interface %s' % iface)
    subprocess.call('ip link set %s down' % iface, shell=True, executable="/bin/bash")
    subprocess.call('ip link set %s down' % iface, shell=True, executable="/bin/bash")
    subprocess.call('ip link set %s down' % iface, shell=True, executable="/bin/bash")
    subprocess.call('iw %s set type monitor' % iface, shell=True, executable="/bin/bash")
    subprocess.call('iw %s set type monitor' % iface, shell=True, executable="/bin/bash")
    subprocess.call('iw %s set type monitor' % iface, shell=True, executable="/bin/bash")
    subprocess.call('ip link set %s up' % iface, shell=True, executable="/bin/bash")
    subprocess.call('ip link set %s up' % iface, shell=True, executable="/bin/bash")
    subprocess.call('ip link set %s up' % iface, shell=True, executable="/bin/bash")
    Logger.info('Launching rogue access point...')
    subprocess.Popen('airbase-ng --essid %s -I 60 %s &> /dev/null' % (essid, iface), shell=True, executable="/bin/bash")
    time.sleep(2)
    subprocess.call('ip addr add 192.168.10.1/24 dev at0', shell=True, executable="/bin/bash")
示例#2
0
def signal_handler(signal, frame):
    global phishing_iface
    global dns
    Logger.info('Shutting down rogue AP')
    subprocess.call('pkill -9 airbase-ng', shell=True)
    Logger.info('Up wireless interface')
    subprocess.call('ip link set %s up' % phishing_iface, shell=True, executable="/bin/bash")
    subprocess.call('ip link set %s up' % phishing_iface, shell=True, executable="/bin/bash")
    subprocess.call('ip link set %s up' % phishing_iface, shell=True, executable="/bin/bash")
    Logger.info('Restoring iptables rules')
    restore_iptables()
    dns.kill()
    dns.restore()
    Logger.info('Bye !')
    sys.exit(0)
示例#3
0
 def kill(self):
 	Logger.info('Killing dnsmasq instance')
     subprocess.call('killall -9 dnsmasq &> /dev/null', shell=True, executable="/bin/bash")
示例#4
0
 def restore(self):
 	Logger.info('Restoring dnsmasq base config file')
     subprocess.call('[[ -f /tmp/weefeesher.dnsmasq.conf ]] && mv /tmp/weefeesher.dnsmasq.conf /etc/dnsmasq.conf', shell=True, executable="/bin/bash")