added version attr to all plugins

This commit is contained in:
byt3bl33d3r 2015-03-10 04:01:28 +01:00
parent 4c465b3806
commit ad6c3d8ed3
16 changed files with 36 additions and 20 deletions

View file

@ -14,6 +14,7 @@ class AppCachePlugin(Plugin):
optname = "appoison"
desc = "Performs App Cache Poisoning attacks"
implements = ["handleResponse"]
version = "0.3"
has_opts = False
req_root = False

View file

@ -15,6 +15,7 @@ class BeefAutorun(Inject, Plugin):
optname = "beefauto"
desc = "Injects BeEF hooks & autoruns modules based on Browser and/or OS type"
depends = ["Inject"]
version = "0.3"
req_root = False
has_opts = False

View file

@ -9,6 +9,7 @@ class BrowserProfiler(Inject, Plugin):
desc = "Attempts to enumerate all browser plugins of connected clients"
implements = ["handleResponse", "handleHeader", "connectionMade", "sendPostData"]
depends = ["Inject"]
version = "0.2"
has_opts = False
req_root = False

View file

@ -7,6 +7,7 @@ class CacheKill(Plugin):
desc = "Kills page caching by modifying headers"
implements = ["handleHeader", "connectionMade"]
bad_headers = ['if-none-match', 'if-modified-since']
version = "0.1"
has_opts = True
req_root = False

View file

@ -57,6 +57,7 @@ class FilePwn(Plugin):
optname = "filepwn"
desc = "Backdoor executables being sent over http using bdfactory"
implements = ["handleResponse"]
version = "0.2"
has_opts = False
req_root = False

View file

@ -15,6 +15,7 @@ class Inject(CacheKill, Plugin):
has_opts = True
req_root = False
desc = "Inject arbitrary content into HTML content"
version = "0.2"
depends = ["CacheKill"]
def initialize(self, options):

View file

@ -19,6 +19,7 @@ class JavaPwn(BrowserProfiler, Plugin):
optname = "javapwn"
desc = "Performs drive-by attacks on clients with out-of-date java browser plugins"
depends = ["Browserprofiler"]
version = "0.3"
has_opts = False
def initialize(self, options):

View file

@ -8,6 +8,7 @@ class jskeylogger(Inject, Plugin):
desc = "Injects a javascript keylogger into clients webpages"
implements = ["handleResponse", "handleHeader", "connectionMade", "sendPostData"]
depends = ["Inject"]
version = "0.2"
has_opts = False
req_root = False

View file

@ -16,6 +16,7 @@ class Replace(CacheKill, Plugin):
desc = "Replace arbitrary content in HTML content"
implements = ["handleResponse", "handleHeader", "connectionMade"]
depends = ["CacheKill"]
version = "0.1"
has_opts = True
req_root = False

View file

@ -10,6 +10,7 @@ class Responder(Plugin):
name = "Responder"
optname = "responder"
desc = "Poison LLMNR, NBT-NS and MDNS requests"
version = "0.2"
has_opts = True
req_root = True

View file

@ -8,6 +8,7 @@ class SMBAuth(Inject, Plugin):
optname = "smbauth"
desc = "Evoke SMB challenge-response auth attempts"
depends = ["Inject"]
version = "0.1"
has_opts = True
req_root = False

View file

@ -6,6 +6,7 @@ class HSTSbypass(Plugin):
name = 'SSLstrip+'
optname = 'hsts'
desc = 'Enables SSLstrip+ for partial HSTS bypass'
version = "0.2"
has_opts = False
req_root = False

View file

@ -17,6 +17,7 @@ class SessionHijacker(Plugin):
optname = "hijack"
desc = "Performs session hijacking attacks against clients"
implements = ["cleanHeaders"] #["handleHeader"]
version = "0.1"
has_opts = True
req_root = False

View file

@ -20,6 +20,7 @@ class Sniffer(Plugin):
optname = "sniffer"
desc = "Sniffs for various protocol login and auth attempts"
implements = ["sendRequest"]
version = "0.1"
has_opts = False
req_root = True

View file

@ -21,6 +21,7 @@ class Spoof(Plugin):
name = "Spoof"
optname = "spoof"
desc = 'Redirect/Modify traffic using ICMP, ARP or DHCP'
version = "0.4"
has_opts = True
req_root = True
@ -124,10 +125,10 @@ class Spoof(Plugin):
self.arp.arp_inter = 1
if self.target:
print "\n[*] Re-ARPing target"
self.arp.reArp_target(5)
self.arp.reARP_target(5)
print "\n[*] Re-ARPing network"
self.arp.reArp_net(5)
self.arp.reARP_net(5)
elif self.options.icmp:
self.icmp.stop()
@ -350,13 +351,13 @@ class _ARP():
return pkt
def reArp_net(self, count):
def reARP_net(self, count):
pkt = Ether(src=self.gatewaymac, dst='ff:ff:ff:ff:ff:ff')/\
ARP(psrc=self.gateway, hwsrc=self.gatewaymac, op=2)
sendp(pkt, inter=self.arp_inter, count=count, iface=self.interface)
def reArp_target(self, count):
def reARP_target(self, count):
pkt = Ether(src=self.gatewaymac, dst='ff:ff:ff:ff:ff:ff')/\
ARP(psrc=self.target, hwsrc=self.targetmac, op=2)
@ -405,7 +406,7 @@ class _DNS():
if not pkt.haslayer(DNSQR):
payload.accept()
else:
logging.info("Got DNS packet for %s %s" % (pkt[DNSQR].qname, pkt[DNSQR].qtype))
logging.debug("Got DNS packet for %s %s" % (pkt[DNSQR].qname, pkt[DNSQR].qtype))
if self.dns:
for k, v in self.dnscfg.items():
if k in pkt[DNSQR].qname:

View file

@ -9,6 +9,7 @@ class Upsidedownternet(Plugin):
optname = "upsidedownternet"
desc = 'Flips images 180 degrees'
implements = ["handleResponse", "handleHeader"]
version = "0.1"
has_opts = False
req_root = False