-
Notifications
You must be signed in to change notification settings - Fork 45
/
portalsmash.rb
executable file
·376 lines (312 loc) · 9.67 KB
/
portalsmash.rb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
#!/usr/bin/ruby
require 'rubygems'
require 'mechanize'
require 'yaml'
require 'trollop'
#State Machine
# States:
# Start - we know nothing.
# List - We have the scanned list, written to a file.
# Attached - We've gotten an attached note from WPA_CLI.
# HasIP - We have an IP address from dhclient.
# Breaker - We're running the breaker.
# Monitor - Connection is solid, we'll periodically check it.
# State, Transition, New State
# Start, ScanSuccess, List
# Start, ScanFail, Start
# List, AttachSuccess, Attached
# List, AttachFail, List
# Attached, DHCPSuccess, HasIP
# Attached, DHCPFail, List
# HasIP, CCSuccess, Monitor
# HasIP, CCFail, Breaker
# Breaker, CCSuccess, Monitor
# Breaker, CCFail, List
# Monitor, CCSuccess, Monitor
# Monitor, CCFail, Start
class PortalSmasher
#Variables for seeing what it's doing right now - not modifiable outside the class
attr_reader :state, :running, :scan_success, :attach_state, :dhcp_success, :cc_success, :number_of_networks, :net_counter
TESTPAGE = 'http://www.apple.com/library/test/success.html'
CONFPATH = '/tmp/portalsmash.conf'
DHCP_CONFIG = File.dirname(__FILE__)+'/dhclient.conf'
ATTACH_SUCCESS = 0
ATTACH_FAIL = 1
ATTACH_OUT = 2
def initialize(dev, file, sig)
@state = :start
@running = true
@number_of_networks = 0
@net_counter = 0
#Storage variables internal to the class (No accessors)
@device = dev
@list_count = 0
@page = nil
@agent = Mechanize.new
@knownnetworks = {}
@sig = sig
if file
@knownnetworks = YAML.load_file(file)
end
end
def stop
@running = false
end
def scan
puts "Scanning"
encnets = []
unencnets = []
File.open(CONFPATH, "w") do |f|
f.puts "ctrl_interface=DIR=/var/run/wpa_supplicant"
networklist = `iwlist #{@device} scan`;
if ($?.exitstatus != 0)
return false #iwlist didn't work right.
end
networks = networklist.split(/Cell \d{2}/); #This will give us cell 1 in @networks[1], as [0] will hold junk
networks.delete_at(0)
usednetworks = {}
networks.each do |net|
data = net.split(/\n/)
bssid = data[0].match(/([A-F0-9]{2}:[A-F0-9]{2}:[A-F0-9]{2}:[A-F0-9]{2}:[A-F0-9]{2}:[A-F0-9]{2})/)[1]
ssid = data[5].match(/ESSID\:\"(.*)\"/)[1]
enc = data[4].match(/Encryption key:(.+)/)[1]
#So, only proceed if either we know the network, or if there's no encryption -- and either way, only
#if we haven't done this network before (to prevent trying to connect to 80 different instances of
#the same WiFi network)7888888
if (!usednetworks[ssid] and ((enc == "off") or (@knownnetworks[ssid])))
str = ""
str += "network={\n"
str += "ssid=\"#{ssid}\"\n"
str += "scan_ssid=1\n"
if (enc == "on")
# This is just a brutal hack. I can be a lot more precise-- specifying CCMP and the like-- but it doesn't matter, weirdly.
if net =~ /WPA/
if (@knownnetworks[ssid]['key']) #Then it's WPA-PSK
str += "key_mgmt=WPA-PSK\n"
str += "psk=\"#{@knownnetworks[ssid]['key']}\"\n"
else #Then it's WPAE
str += "key_mgmt=WPA-EAP\n"
str += "identity=\"#{@knownnetworks[ssid]['username']}\"\n"
str += "password=\"#{@knownnetworks[ssid]['password']}\"\n"
end
else #WEP
str += "key_mgmt=NONE\n"
str += "wep_tx_keyidx=0\n"
str += "wep_key0=\"#{@knownnetworks[ssid]['key']}\"\n"
end
else
str += "key_mgmt=NONE\n"
end
str += "}\n"
usednetworks[ssid] = 1
if @knownnetworks[ssid]
encnets.push(str)
else
unencnets.push(str)
end
end
end
puts "Encnets: #{encnets.size} Unencnets: #{unencnets.size}"
encnets.each do |s|
f.puts s
end
unencnets.each do |s|
f.puts s
end
end
@net_counter = 0
@number_of_networks = encnets.size + unencnets.size
if (@number_of_networks == 0)
return false
end
true
#exit(0)
end
def attach
if (@net_counter.to_i >= @number_of_networks.to_i)
puts "I'm out of networks to which I can attach."
return ATTACH_OUT
end
puts "Attaching to Network #{@net_counter+1} of #{@number_of_networks}."
`wpa_cli select #{@net_counter}`
@net_counter += 1
sleep(5)
stat = `wpa_cli status`
if (stat =~ /COMPLETED/)
return ATTACH_SUCCESS
elsif (@net_counter.to_i >= @number_of_networks.to_i)
return ATTACH_OUT
else
return ATTACH_FAIL
end
end
def dhcp
puts "DCHP-ing"
`dhclient #{@device} -cf #{DHCP_CONFIG} -r` #DHCP Release, and tells any old DHClients to let go of @device
`dhclient #{@device} -cf #{DHCP_CONFIG} -1` #Try just once, with timeout specified in DHCP_CONFIG
if $?.exitstatus != 0
return false
else
return true
end
end
def conncheck
puts "Checking Connection"
begin
@page = @agent.get(TESTPAGE)
if (@page.title == "Success") #Could add other checks here.
true
else
false
end
rescue => e
puts "Crash during connection checking, so that's a no."
false
end
end
def runbreak
puts "Portal Breaking"
return if @page.nil?
if (@page.forms.size == 1 && @page.forms[0].buttons.size == 1)
f = @page.forms[0]
f.submit(f.buttons[0])
elsif (@page.forms.size == 1 && @page.forms[0].buttons.size == 0)
p2 = @page.forms[0].submit
if (p2.forms[0].buttons.size == 1)
#WanderingWifi
#This is sick, but truthfully this works. Shocking.
f2 = p2.forms[0]
p3 = f2.submit(f2.buttons[0])
p4 = p3.forms[0].submit
p5 = p4.forms[0].submit
p6 = p5.forms[0].submit
p7 = p6.forms[0].submit
p8 = agent.get('http://portals.wanderingwifi.com:8080/session.asp')
end
end
end
def killthings
`pkill -KILL wpa_supplicant`
`pkill -KILL dhclient`
`ifconfig #{@device} up` #because when we've killed this, sometimes it stays down.
end
def startwpa
`wpa_supplicant -B -i #{@device} -c #{CONFPATH}`
if $?.exitstatus != 0
return false
else
return true
end
end
def sendsig
begin
pid = File.read @sig
rescue => e
puts "I was given a PID file to tell, but I don't see it."
end
if !pid.nil?
`kill -s SIGUSR1 #{pid}`
end
end
end
def run
while @running
#sleep 1
puts ""
puts "State: #{@state}"
case @state
when :start
killthings
@scan_success = scan
if @scan_success
@state = :list
if startwpa == false
@state = :start
puts "Failed to start wpa_supplicant. Are you root?"
sleep(2)
end
else
@state = :start
puts "Scan failed using #{@device}."
sleep(2)
end
when :list
@attach_state = attach
case @attach_state
when ATTACH_SUCCESS
@state = :attached
when ATTACH_FAIL
@state = :list
when ATTACH_OUT
@state = :start
end
when :attached
@dhcp_success = dhcp
if @dhcp_success
@state = :hasip
else
@state = :attached
end
when :hasip
@cc_success = conncheck
if @cc_success
sendsig
@state = :monitor
else
@state = :breaker
end
when :breaker
runbreak
@cc_success = conncheck
if @cc_success
sendsig
@state = :monitor
else
@state = :list
end
when :monitor
sleep 2
@cc_success = conncheck
if @cc_success
@state = :monitor
else
@state = :start
end
end
end
end
end
opts = Trollop::options do
version "Version 0.01, (c) 2013 Malice Afterthought, Inc."
banner <<-HEREBEDRAGONS
PortalSmash is a program that gets you through "captive portals" and other
annoyances. It connects to any open WiFi and attempts to get an IP and make
sure it works. If it works, it keeps rechecking every few seconds,
reconnecting (or finding a new connection) if it drops.
Sig:
If you wish, you may specify a path that contains a PID for PortalSmash to
send a SIGUSR1 to. This will be sent whenever PortalSmash connects to a new
network. If the PID changes over time, that's fine; PortalSmash will read
the file again each time it sends a SIGUSR1.
Netfile format:
PortalSmash allows a network key file to be specified that includes, well, keys
for networks. The file must be in YAML, and formatted approximately as so:
---
NetName:
key: ohboyitsakey
HypotheticalWPAE:
username: foo
password: bar
This will allow the program to connect to WiFi for which you have been given
credentials (e.g., your home WiFi network).
Usage:
portalsmash [options]
where [options] are:
HEREBEDRAGONS
opt :device, "Device to connect", :type => :string, :default => "wlan0" # string --name <device>, default to wlan0
opt :netfile, "Network key file in YAML format, as detailed above", :type => :io #io --netfile <path>
opt :sig, "Path which will contain a PID for PortalSmash to send a SIGUSR1 to", :type => :string, :default => nil
end
ps = PortalSmasher.new(opts[:device], opts[:netfile], opts[:sig])
ps.run