diff --git a/poisoners/LLMNR.py b/poisoners/LLMNR.py
index 5c3fb8f..460eaf1 100755
--- a/poisoners/LLMNR.py
+++ b/poisoners/LLMNR.py
@@ -16,7 +16,7 @@
# along with this program. If not, see .
from packets import LLMNR_Ans, LLMNR6_Ans
from utils import *
-from datetime import datetime
+import datetime
if (sys.version_info > (3, 0)):
from socketserver import BaseRequestHandler
diff --git a/poisoners/MDNS.py b/poisoners/MDNS.py
index 69c132a..83641d1 100755
--- a/poisoners/MDNS.py
+++ b/poisoners/MDNS.py
@@ -16,7 +16,7 @@
# along with this program. If not, see .
import struct
import sys
-from datetime import datetime
+import datetime
if (sys.version_info > (3, 0)):
from socketserver import BaseRequestHandler
else:
@@ -75,7 +75,7 @@ class MDNS(BaseRequestHandler):
Buffer.calculate()
soc.sendto(NetworkSendBufferPython2or3(Buffer), self.client_address)
- print(color('%s %s Poisoned answer sent to %-15s for name %s' % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), Request_Name), 2, 1))
+ print(color('%s %s Poisoned answer sent to %-15s for name %s' % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), Request_Name), 2, 1))
SavePoisonersToDb({
'Poisoner': 'MDNS',
'SentToIp': self.client_address[0],
@@ -89,7 +89,7 @@ class MDNS(BaseRequestHandler):
Buffer.calculate()
soc.sendto(NetworkSendBufferPython2or3(Buffer), self.client_address)
- print(color('%s %s Poisoned answer sent to %-15s for name %s' % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), Request_Name), 2, 1))
+ print(color('%s %s Poisoned answer sent to %-15s for name %s' % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), Request_Name), 2, 1))
SavePoisonersToDb({
'Poisoner': 'MDNS6',
'SentToIp': self.client_address[0],
diff --git a/poisoners/NBTNS.py b/poisoners/NBTNS.py
index 05a962a..ee339a2 100755
--- a/poisoners/NBTNS.py
+++ b/poisoners/NBTNS.py
@@ -17,7 +17,7 @@
import sys
from packets import NBT_Ans
from utils import *
-from datetime import datetime
+import datetime
if (sys.version_info > (3, 0)):
from socketserver import BaseRequestHandler
@@ -49,7 +49,7 @@ class NBTNS(BaseRequestHandler):
Buffer1.calculate(data)
socket.sendto(NetworkSendBufferPython2or3(Buffer1), self.client_address)
LineHeader = "[*] [NBT-NS]"
- print(color("%s %s Poisoned answer sent to %s for name %s (service: %s)" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"), self.client_address[0].replace("::ffff:",""), Name, NBT_NS_Role(NetworkRecvBufferPython2or3(data[43:46]))), 2, 1))
+ print(color("%s %s Poisoned answer sent to %s for name %s (service: %s)" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"), self.client_address[0].replace("::ffff:",""), Name, NBT_NS_Role(NetworkRecvBufferPython2or3(data[43:46]))), 2, 1))
SavePoisonersToDb({
'Poisoner': 'NBT-NS',
'SentToIp': self.client_address[0],
diff --git a/servers/DNS.py b/servers/DNS.py
index 74df461..edf700b 100755
--- a/servers/DNS.py
+++ b/servers/DNS.py
@@ -16,7 +16,7 @@
# along with this program. If not, see .
from utils import *
from packets import DNS_Ans, DNS_SRV_Ans, DNS6_Ans, DNS_AnsOPT
-from datetime import datetime
+import datetime
if settings.Config.PY2OR3 == "PY3":
from socketserver import BaseRequestHandler
else:
@@ -52,7 +52,7 @@ class DNS(BaseRequestHandler):
soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address)
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
- print(color("%s %s A Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
+ print(color("%s %s A Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "OPTIPv4":
buff = DNS_AnsOPT()
@@ -60,7 +60,7 @@ class DNS(BaseRequestHandler):
soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address)
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
- print(color("%s %s A OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
+ print(color("%s %s A OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "SRV":
buff = DNS_SRV_Ans()
@@ -68,7 +68,7 @@ class DNS(BaseRequestHandler):
soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address)
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
- print(color("%s %s SRV Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
+ print(color("%s %s SRV Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "IPv6":
buff = DNS6_Ans()
@@ -76,7 +76,7 @@ class DNS(BaseRequestHandler):
soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address)
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
- print(color("%s %s AAAA Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
+ print(color("%s %s AAAA Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "OPTIPv6":
buff = DNS6_Ans()
@@ -84,7 +84,7 @@ class DNS(BaseRequestHandler):
soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address)
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
- print(color("%s %s AAAA OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
+ print(color("%s %s AAAA OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
except Exception:
@@ -106,7 +106,7 @@ class DNSTCP(BaseRequestHandler):
self.request.send(NetworkSendBufferPython2or3(buff))
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
- print(color("%s %s A Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
+ print(color("%s %s A Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "OPTIPv4":
buff = DNS_AnsOPT()
@@ -114,7 +114,7 @@ class DNSTCP(BaseRequestHandler):
self.request.send(NetworkSendBufferPython2or3(buff))
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
- print(color("%s %s A OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
+ print(color("%s %s A OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "SRV":
buff = DNS_SRV_Ans()
@@ -122,7 +122,7 @@ class DNSTCP(BaseRequestHandler):
self.request.send(NetworkSendBufferPython2or3(buff))
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
- print(color("%s %s SRV Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
+ print(color("%s %s SRV Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "IPv6":
buff = DNS6_Ans()
@@ -130,7 +130,7 @@ class DNSTCP(BaseRequestHandler):
self.request.send(NetworkSendBufferPython2or3(buff))
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
- print(color("%s %s AAAA Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
+ print(color("%s %s AAAA Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "OPTIPv6":
buff = DNS6_AnsOPT()
@@ -138,7 +138,7 @@ class DNSTCP(BaseRequestHandler):
self.request.send(NetworkSendBufferPython2or3(buff))
ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"])
- print(color("%s %s AAAA OPT Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
+ print(color("%s %s AAAA OPT Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1))
except Exception:
pass