From 5b0baa88ea49afce3287c7adb63c5773322f3eaa Mon Sep 17 00:00:00 2001 From: PatchRequest Date: Mon, 1 Aug 2022 21:39:16 +0200 Subject: [PATCH] fix when multi import datetime fix when multi import datetime --- poisoners/LLMNR.py | 2 +- poisoners/MDNS.py | 6 +++--- poisoners/NBTNS.py | 4 ++-- servers/DNS.py | 22 +++++++++++----------- 4 files changed, 17 insertions(+), 17 deletions(-) diff --git a/poisoners/LLMNR.py b/poisoners/LLMNR.py index 5c3fb8f..460eaf1 100755 --- a/poisoners/LLMNR.py +++ b/poisoners/LLMNR.py @@ -16,7 +16,7 @@ # along with this program. If not, see . from packets import LLMNR_Ans, LLMNR6_Ans from utils import * -from datetime import datetime +import datetime if (sys.version_info > (3, 0)): from socketserver import BaseRequestHandler diff --git a/poisoners/MDNS.py b/poisoners/MDNS.py index 69c132a..83641d1 100755 --- a/poisoners/MDNS.py +++ b/poisoners/MDNS.py @@ -16,7 +16,7 @@ # along with this program. If not, see . import struct import sys -from datetime import datetime +import datetime if (sys.version_info > (3, 0)): from socketserver import BaseRequestHandler else: @@ -75,7 +75,7 @@ class MDNS(BaseRequestHandler): Buffer.calculate() soc.sendto(NetworkSendBufferPython2or3(Buffer), self.client_address) - print(color('%s %s Poisoned answer sent to %-15s for name %s' % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), Request_Name), 2, 1)) + print(color('%s %s Poisoned answer sent to %-15s for name %s' % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), Request_Name), 2, 1)) SavePoisonersToDb({ 'Poisoner': 'MDNS', 'SentToIp': self.client_address[0], @@ -89,7 +89,7 @@ class MDNS(BaseRequestHandler): Buffer.calculate() soc.sendto(NetworkSendBufferPython2or3(Buffer), self.client_address) - print(color('%s %s Poisoned answer sent to %-15s for name %s' % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), Request_Name), 2, 1)) + print(color('%s %s Poisoned answer sent to %-15s for name %s' % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), Request_Name), 2, 1)) SavePoisonersToDb({ 'Poisoner': 'MDNS6', 'SentToIp': self.client_address[0], diff --git a/poisoners/NBTNS.py b/poisoners/NBTNS.py index 05a962a..ee339a2 100755 --- a/poisoners/NBTNS.py +++ b/poisoners/NBTNS.py @@ -17,7 +17,7 @@ import sys from packets import NBT_Ans from utils import * -from datetime import datetime +import datetime if (sys.version_info > (3, 0)): from socketserver import BaseRequestHandler @@ -49,7 +49,7 @@ class NBTNS(BaseRequestHandler): Buffer1.calculate(data) socket.sendto(NetworkSendBufferPython2or3(Buffer1), self.client_address) LineHeader = "[*] [NBT-NS]" - print(color("%s %s Poisoned answer sent to %s for name %s (service: %s)" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"), self.client_address[0].replace("::ffff:",""), Name, NBT_NS_Role(NetworkRecvBufferPython2or3(data[43:46]))), 2, 1)) + print(color("%s %s Poisoned answer sent to %s for name %s (service: %s)" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"), self.client_address[0].replace("::ffff:",""), Name, NBT_NS_Role(NetworkRecvBufferPython2or3(data[43:46]))), 2, 1)) SavePoisonersToDb({ 'Poisoner': 'NBT-NS', 'SentToIp': self.client_address[0], diff --git a/servers/DNS.py b/servers/DNS.py index 74df461..edf700b 100755 --- a/servers/DNS.py +++ b/servers/DNS.py @@ -16,7 +16,7 @@ # along with this program. If not, see . from utils import * from packets import DNS_Ans, DNS_SRV_Ans, DNS6_Ans, DNS_AnsOPT -from datetime import datetime +import datetime if settings.Config.PY2OR3 == "PY3": from socketserver import BaseRequestHandler else: @@ -52,7 +52,7 @@ class DNS(BaseRequestHandler): soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address) ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"]) - print(color("%s %s A Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) + print(color("%s %s A Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "OPTIPv4": buff = DNS_AnsOPT() @@ -60,7 +60,7 @@ class DNS(BaseRequestHandler): soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address) ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"]) - print(color("%s %s A OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) + print(color("%s %s A OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "SRV": buff = DNS_SRV_Ans() @@ -68,7 +68,7 @@ class DNS(BaseRequestHandler): soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address) ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"]) - print(color("%s %s SRV Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) + print(color("%s %s SRV Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "IPv6": buff = DNS6_Ans() @@ -76,7 +76,7 @@ class DNS(BaseRequestHandler): soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address) ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"]) - print(color("%s %s AAAA Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) + print(color("%s %s AAAA Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "OPTIPv6": buff = DNS6_Ans() @@ -84,7 +84,7 @@ class DNS(BaseRequestHandler): soc.sendto(NetworkSendBufferPython2or3(buff), self.client_address) ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"]) - print(color("%s %s AAAA OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) + print(color("%s %s AAAA OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) except Exception: @@ -106,7 +106,7 @@ class DNSTCP(BaseRequestHandler): self.request.send(NetworkSendBufferPython2or3(buff)) ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"]) - print(color("%s %s A Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) + print(color("%s %s A Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "OPTIPv4": buff = DNS_AnsOPT() @@ -114,7 +114,7 @@ class DNSTCP(BaseRequestHandler): self.request.send(NetworkSendBufferPython2or3(buff)) ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"]) - print(color("%s %s A OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) + print(color("%s %s A OPT Record poisoned answer sent to: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "SRV": buff = DNS_SRV_Ans() @@ -122,7 +122,7 @@ class DNSTCP(BaseRequestHandler): self.request.send(NetworkSendBufferPython2or3(buff)) ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"]) - print(color("%s %s SRV Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) + print(color("%s %s SRV Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "IPv6": buff = DNS6_Ans() @@ -130,7 +130,7 @@ class DNSTCP(BaseRequestHandler): self.request.send(NetworkSendBufferPython2or3(buff)) ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"]) - print(color("%s %s AAAA Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) + print(color("%s %s AAAA Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) if ParseDNSType(NetworkRecvBufferPython2or3(data)) == "OPTIPv6": buff = DNS6_AnsOPT() @@ -138,7 +138,7 @@ class DNSTCP(BaseRequestHandler): self.request.send(NetworkSendBufferPython2or3(buff)) ResolveName = re.sub('[^0-9a-zA-Z]+', '.', buff.fields["QuestionName"]) - print(color("%s %s AAAA OPT Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) + print(color("%s %s AAAA OPT Record poisoned answer sent: %-15s Requested name: %s" % (LineHeader,datetime.datetime.now().strftime("%d-%b-%Y (%H:%M:%S)"),self.client_address[0].replace("::ffff:",""), ResolveName), 2, 1)) except Exception: pass