This commit is contained in:
vflame6 2023-11-17 10:14:08 -03:00 committed by GitHub
commit 617f96192a
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
3 changed files with 25 additions and 22 deletions

View file

@ -63,14 +63,15 @@ class LLMNR(BaseRequestHandler): # LLMNR Server class
#IPv4 #IPv4
if data[2:4] == b'\x00\x00' and LLMNRType: if data[2:4] == b'\x00\x00' and LLMNRType:
if settings.Config.AnalyzeMode: if settings.Config.AnalyzeMode:
LineHeader = "[Analyze mode: LLMNR]" if not settings.Config.Quiet_Mode:
print(color("%s Request by %s for %s, ignoring" % (LineHeader, self.client_address[0].replace("::ffff:",""), Name), 2, 1)) LineHeader = "[Analyze mode: LLMNR]"
SavePoisonersToDb({ print(color("%s Request by %s for %s, ignoring" % (LineHeader, self.client_address[0].replace("::ffff:",""), Name), 2, 1))
'Poisoner': 'LLMNR', SavePoisonersToDb({
'SentToIp': self.client_address[0], 'Poisoner': 'LLMNR',
'ForName': Name, 'SentToIp': self.client_address[0],
'AnalyzeMode': '1', 'ForName': Name,
}) 'AnalyzeMode': '1',
})
elif LLMNRType == True: # Poisoning Mode elif LLMNRType == True: # Poisoning Mode
Buffer1 = LLMNR_Ans(Tid=NetworkRecvBufferPython2or3(data[0:2]), QuestionName=Name, AnswerName=Name) Buffer1 = LLMNR_Ans(Tid=NetworkRecvBufferPython2or3(data[0:2]), QuestionName=Name, AnswerName=Name)

View file

@ -61,13 +61,14 @@ class MDNS(BaseRequestHandler):
return None return None
if settings.Config.AnalyzeMode: # Analyze Mode if settings.Config.AnalyzeMode: # Analyze Mode
print(text('[Analyze mode: MDNS] Request by %-15s for %s, ignoring' % (color(self.client_address[0].replace("::ffff:",""), 3), color(Request_Name, 3)))) if not settings.Config.Quiet_Mode:
SavePoisonersToDb({ print(text('[Analyze mode: MDNS] Request by %-15s for %s, ignoring' % (color(self.client_address[0].replace("::ffff:",""), 3), color(Request_Name, 3))))
'Poisoner': 'MDNS', SavePoisonersToDb({
'SentToIp': self.client_address[0], 'Poisoner': 'MDNS',
'ForName': Request_Name, 'SentToIp': self.client_address[0],
'AnalyzeMode': '1', 'ForName': Request_Name,
}) 'AnalyzeMode': '1',
})
elif MDNSType == True: # Poisoning Mode elif MDNSType == True: # Poisoning Mode
Poisoned_Name = Poisoned_MDNS_Name(data) Poisoned_Name = Poisoned_MDNS_Name(data)
Buffer = MDNS_Ans(AnswerName = Poisoned_Name) Buffer = MDNS_Ans(AnswerName = Poisoned_Name)

View file

@ -36,13 +36,14 @@ class NBTNS(BaseRequestHandler):
if data[2:4] == b'\x01\x10': if data[2:4] == b'\x01\x10':
if settings.Config.AnalyzeMode: # Analyze Mode if settings.Config.AnalyzeMode: # Analyze Mode
print(text('[Analyze mode: NBT-NS] Request by %-15s for %s, ignoring' % (color(self.client_address[0].replace("::ffff:",""), 3), color(Name, 3)))) if not settings.Config.Quiet_Mode:
SavePoisonersToDb({ print(text('[Analyze mode: NBT-NS] Request by %-15s for %s, ignoring' % (color(self.client_address[0].replace("::ffff:",""), 3), color(Name, 3))))
'Poisoner': 'NBT-NS', SavePoisonersToDb({
'SentToIp': self.client_address[0], 'Poisoner': 'NBT-NS',
'ForName': Name, 'SentToIp': self.client_address[0],
'AnalyzeMode': '1', 'ForName': Name,
}) 'AnalyzeMode': '1',
})
else: # Poisoning Mode else: # Poisoning Mode
Buffer1 = NBT_Ans() Buffer1 = NBT_Ans()
Buffer1.calculate(data) Buffer1.calculate(data)