Fixed some tools and +x on some executables

This commit is contained in:
lgandx 2016-06-05 19:55:32 -05:00
parent f5a8bf0650
commit 8171a96b9e
9 changed files with 13 additions and 6 deletions

View file

@ -2,7 +2,7 @@
LLMNR/NBT-NS/mDNS Poisoner LLMNR/NBT-NS/mDNS Poisoner
(Original work by Laurent Gaffie <lgaffie@trustwave.com> http://www.spiderlabs.com) Author: Laurent Gaffie <laurent.gaffie@gmail.com > http://www.spiderlabs.com

0
Responder.py Normal file → Executable file
View file

View file

@ -21,7 +21,7 @@ import struct
import string import string
import logging import logging
from utils import * #from utils import *
from odict import OrderedDict from odict import OrderedDict
from packets import SMBHeader, SMBNego, SMBNegoFingerData, SMBSessionFingerData from packets import SMBHeader, SMBNego, SMBNegoFingerData, SMBSessionFingerData

0
tools/DHCP.py Normal file → Executable file
View file

0
tools/FindSQLSrv.py Normal file → Executable file
View file

0
tools/Icmp-Redirect.py Normal file → Executable file
View file

View file

@ -14,7 +14,8 @@
# #
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import struct import struct, sys
sys.path.append('../')
from odict import OrderedDict from odict import OrderedDict
class Packet: class Packet:

4
tools/SMBRelay.py Normal file → Executable file
View file

@ -15,8 +15,10 @@
# You should have received a copy of the GNU General Public License # You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>. # along with this program. If not, see <http://www.gnu.org/licenses/>.
import sys, os, struct,re,socket,random, RelayPackets,optparse,thread import sys, os, struct,re,socket,random, RelayPackets,optparse,thread
sys.path.append('../')
from fingerprint import RunSmbFinger from fingerprint import RunSmbFinger
from odict import OrderedDict from odict import OrderedDict
from utils import longueur
from socket import * from socket import *
from RelayPackets import * from RelayPackets import *
@ -61,7 +63,7 @@ Command = options.CMD
Target = options.TARGET Target = options.TARGET
Responder_IP = options.Responder_IP Responder_IP = options.Responder_IP
print "\nResponder SMBRelay 0.1\nPlease send bugs/comments to: lgaffie@trustwave.com" print "\nResponder SMBRelay 0.1\nPlease send bugs/comments to: laurent.gaffie@gmail.com"
print '\033[31m'+'Use this script in combination with Responder.py for best results (remember to set SMB = Off in Responder.conf)..\nUsernames to relay (-u) are case sensitive.'+'\033[0m' print '\033[31m'+'Use this script in combination with Responder.py for best results (remember to set SMB = Off in Responder.conf)..\nUsernames to relay (-u) are case sensitive.'+'\033[0m'
print 'To kill this script hit CRTL-C or Enter\nWill relay credentials for these users: '+'\033[1m\033[34m'+', '.join(UserToRelay)+'\033[0m\n' print 'To kill this script hit CRTL-C or Enter\nWill relay credentials for these users: '+'\033[1m\033[34m'+', '.join(UserToRelay)+'\033[0m\n'

View file

@ -21,7 +21,7 @@ import logging
import socket import socket
import time import time
import settings import settings
import struct
try: try:
import sqlite3 import sqlite3
except: except:
@ -383,3 +383,7 @@ def hexdump(src, l=0x16):
res.append(('%08X: %-'+str(l*(2+1)+1)+'s |%s|') % (i, hexa, text)) res.append(('%08X: %-'+str(l*(2+1)+1)+'s |%s|') % (i, hexa, text))
return '\n'.join(res) return '\n'.join(res)
def longueur(payload):
length = struct.pack(">i", len(''.join(payload)))
return length