Commit 864a6bcc authored by Sophie Brun's avatar Sophie Brun

Add tools/* into $PATH under the name responder-* (closes 4437)

parent 14eb8501
responder (2.3.3.9-0kali2) kali-dev; urgency=medium
* Add tools/* into $PATH under the name responder-* (closes 4437)
-- Sophie Brun <sophie@freexian.com> Tue, 30 Jan 2018 09:46:36 +0100
responder (2.3.3.9-0kali1) kali-dev; urgency=medium
* Import new upstream release
......
#!/bin/bash
cd /usr/share/responder/tools && ./DHCP_Auto.sh "$@"
......@@ -10,3 +10,57 @@ Fixed the usage examples to display the correct binary name.
parser.add_option('-A','--analyze', action="store_true", help="Analyze mode. This option allows you to see NBT-NS, BROWSER, LLMNR requests without responding.", dest="Analyze", default=False)
parser.add_option('-I','--interface', action="store", help="Network interface to use, you can use 'ALL' as a wildcard for all interfaces", dest="Interface", metavar="eth0", default=None)
parser.add_option('-i','--ip', action="store", help="Local IP to use \033[1m\033[31m(only for OSX)\033[0m", dest="OURIP", metavar="10.0.0.21", default=None)
--- a/tools/DHCP.py
+++ b/tools/DHCP.py
@@ -26,7 +26,7 @@ from odict import OrderedDict
from packets import Packet
from utils import *
-parser = optparse.OptionParser(usage='python %prog -I eth0 -d pwned.com -p 10.20.30.40 -s 10.20.30.1 -r 10.20.40.1', prog=sys.argv[0],)
+parser = optparse.OptionParser(usage='responder-DHCP -I eth0 -d pwned.com -p 10.20.30.40 -s 10.20.30.1 -r 10.20.40.1', prog=sys.argv[0],)
parser.add_option('-I', '--interface', action="store", help="Interface name to use, example: eth0", metavar="eth0",dest="Interface")
parser.add_option('-d', '--dnsname', action="store", help="DNS name to inject, if you don't want to inject a DNS server, provide the original one.", metavar="pwned.com", default="pwned.com",dest="DNSNAME")
parser.add_option('-r', '--router', action="store", help="The ip address of the router or yours if you want to intercept traffic.", metavar="10.20.1.1",dest="RouterIP")
--- a/tools/Icmp-Redirect.py
+++ b/tools/Icmp-Redirect.py
@@ -27,7 +27,7 @@ from time import sleep
from subprocess import call
from packets import Packet
-parser = optparse.OptionParser(usage='python %prog -I eth0 -i 10.20.30.40 -g 10.20.30.254 -t 10.20.30.48 -r 10.20.40.1',
+parser = optparse.OptionParser(usage='responder-Icmp-Redirect -I eth0 -i 10.20.30.40 -g 10.20.30.254 -t 10.20.30.48 -r 10.20.40.1',
prog=sys.argv[0],
)
parser.add_option('-i','--ip', action="store", help="The ip address to redirect the traffic to. (usually yours)", metavar="10.20.30.40",dest="OURIP")
--- a/tools/MultiRelay.py
+++ b/tools/MultiRelay.py
@@ -62,7 +62,7 @@ def UserCallBack(op, value, dmy, parser)
args.extend(getattr(parser.values, op.dest))
setattr(parser.values, op.dest, args)
-parser = optparse.OptionParser(usage="\npython %prog -t 10.20.30.40 -u Administrator lgandx admin\npython %prog -t 10.20.30.40 -u ALL", version=__version__, prog=sys.argv[0])
+parser = optparse.OptionParser(usage="\nresponder-MultiRelay -t 10.20.30.40 -u Administrator lgandx admin\nresponder-MultiRelay -t 10.20.30.40 -u ALL", version=__version__, prog=sys.argv[0])
parser.add_option('-t',action="store", help="Target server for SMB relay.",metavar="10.20.30.45",dest="TARGET")
parser.add_option('-p',action="store", help="Additional port to listen on, this will relay for proxy, http and webdav incoming packets.",metavar="8081",dest="ExtraPort")
parser.add_option('-u', '--UserToRelay', help="Users to relay. Use '-u ALL' to relay all users.", action="callback", callback=UserCallBack, dest="UserToRelay")
--- a/tools/RunFinger.py
+++ b/tools/RunFinger.py
@@ -24,7 +24,7 @@ from RunFingerPackets import *
__version__ = "0.7"
-parser = optparse.OptionParser(usage='python %prog -i 10.10.10.224\nor:\npython %prog -i 10.10.10.0/24', version=__version__, prog=sys.argv[0])
+parser = optparse.OptionParser(usage='responder-RunFinger -i 10.10.10.224\nor:\nresponder-RunFinger -i 10.10.10.0/24', version=__version__, prog=sys.argv[0])
parser.add_option('-i','--ip', action="store", help="Target IP address or class C", dest="TARGET", metavar="10.10.10.224", default=None)
parser.add_option('-g','--grep', action="store_true", dest="Grep", default=False, help="Output in grepable format")
--- a/tools/FindSMB2UPTime.py
+++ b/tools/FindSMB2UPTime.py
@@ -67,6 +67,6 @@ def run(host):
if __name__ == "__main__":
if len(sys.argv)<=1:
- sys.exit('Usage: python '+sys.argv[0]+' System-IP-address')
+ sys.exit('Usage: responder-FindSMB2UPTime System-IP-address')
host = sys.argv[1],445
run(host)
fix-usage-example
fix-version.patch
use-absolute-path.patch
Description: Use absolute path for import
Use a absolute path to find the module packets when we use the symbolic
link in /usr/bin/
Author: Sophie Brun <sophie@freexian.com>
Last-Update: 2018-01-30
---
This patch header follows DEP-3: http://dep.debian.net/deps/dep3/
--- a/tools/Icmp-Redirect.py
+++ b/tools/Icmp-Redirect.py
@@ -19,8 +19,9 @@ import struct
import optparse
import pipes
import sys
+import os
from socket import *
-sys.path.append('../')
+sys.path.append(os.path.abspath(os.path.join(os.path.dirname(__file__), '../')))
from odict import OrderedDict
from random import randrange
from time import sleep
*.py usr/share/responder/
certs files poisoners servers tools usr/share/responder/
Responder.conf etc/responder/
debian/helper-script/* usr/bin/
debian/helper-script/* usr/sbin/
debian/script usr/share/responder
etc/responder/Responder.conf usr/share/responder/Responder.conf
usr/share/responder/script usr/bin/responder-BrowserListener
usr/share/responder/script usr/bin/responder-DHCP
usr/share/responder/script usr/bin/responder-FindSMB2UPTime
usr/share/responder/script usr/bin/responder-FindSQLSrv
usr/share/responder/script usr/bin/responder-Icmp-Redirect
usr/share/responder/script usr/bin/responder-MultiRelay
usr/share/responder/script usr/bin/responder-RunFinger
#!/bin/sh
name_script=$(basename $0)
tool_name=${name_script##responder-}
exec python /usr/share/responder/tools/$tool_name.py "$@"
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment