refact: net.sniffer -> net.sniff

This commit is contained in:
evilsocket 2018-01-10 03:16:52 +01:00
commit c75d4c391b
5 changed files with 24 additions and 24 deletions

View file

@ -52,11 +52,11 @@ Simple password sniffer.
# keep reading arp table for network mapping # keep reading arp table for network mapping
net.recon on net.recon on
# setup a regular expression for packet payloads # setup a regular expression for packet payloads
set net.sniffer.regexp .*password=.+ set net.sniff.regexp .*password=.+
# set the sniffer output file # set the sniffer output file
set net.sniffer.output passwords.pcap set net.sniff.output passwords.pcap
# start the sniffer # start the sniffer
net.sniffer on net.sniff on
``` ```
#### caplets/rest-api.cap #### caplets/rest-api.cap

View file

@ -3,9 +3,9 @@ events.clear
set events.stream.filter net.sniff set events.stream.filter net.sniff
events.stream on events.stream on
set net.sniffer.verbose false set net.sniff.verbose false
set net.sniffer.local true set net.sniff.local true
# http://biot.com/capstats/bpf.html # http://biot.com/capstats/bpf.html
# set net.sniffer.filter not arp and not udp port 53 # set net.sniff.filter not arp and not udp port 53
net.sniffer on net.sniff on

View file

@ -1,12 +1,12 @@
# keep reading arp table for network mapping # keep reading arp table for network mapping
net.recon on net.recon on
set net.sniffer.regexp .*password=.+ set net.sniff.regexp .*password=.+
set net.sniffer.output passwords.cap set net.sniff.output passwords.cap
# start arp spoofing attack # start arp spoofing attack
# arp.spoof on # arp.spoof on
net.sniffer on net.sniff on

View file

@ -19,34 +19,34 @@ type Sniffer struct {
func NewSniffer(s *session.Session) *Sniffer { func NewSniffer(s *session.Session) *Sniffer {
sniff := &Sniffer{ sniff := &Sniffer{
SessionModule: session.NewSessionModule("net.sniffer", s), SessionModule: session.NewSessionModule("net.sniff", s),
Stats: nil, Stats: nil,
} }
sniff.AddParam(session.NewBoolParameter("net.sniffer.verbose", sniff.AddParam(session.NewBoolParameter("net.sniff.verbose",
"true", "true",
"If true, will print every captured packet, otherwise only selected ones.")) "If true, will print every captured packet, otherwise only selected ones."))
sniff.AddParam(session.NewBoolParameter("net.sniffer.local", sniff.AddParam(session.NewBoolParameter("net.sniff.local",
"false", "false",
"If true it will consider packets from/to this computer, otherwise it will skip them.")) "If true it will consider packets from/to this computer, otherwise it will skip them."))
sniff.AddParam(session.NewStringParameter("net.sniffer.filter", sniff.AddParam(session.NewStringParameter("net.sniff.filter",
"not arp", "not arp",
"", "",
"BPF filter for the sniffer.")) "BPF filter for the sniffer."))
sniff.AddParam(session.NewStringParameter("net.sniffer.regexp", sniff.AddParam(session.NewStringParameter("net.sniff.regexp",
"", "",
"", "",
"If filled, only packets matching this regular expression will be considered.")) "If filled, only packets matching this regular expression will be considered."))
sniff.AddParam(session.NewStringParameter("net.sniffer.output", sniff.AddParam(session.NewStringParameter("net.sniff.output",
"", "",
"", "",
"If set, the sniffer will write captured packets to this file.")) "If set, the sniffer will write captured packets to this file."))
sniff.AddHandler(session.NewModuleHandler("net.sniffer stats", "", sniff.AddHandler(session.NewModuleHandler("net.sniff stats", "",
"Print sniffer session configuration and statistics.", "Print sniffer session configuration and statistics.",
func(args []string) error { func(args []string) error {
sniff.Ctx.Log(sniff.Session) sniff.Ctx.Log(sniff.Session)
@ -57,13 +57,13 @@ func NewSniffer(s *session.Session) *Sniffer {
return sniff.Stats.Print() return sniff.Stats.Print()
})) }))
sniff.AddHandler(session.NewModuleHandler("net.sniffer on", "", sniff.AddHandler(session.NewModuleHandler("net.sniff on", "",
"Start network sniffer in background.", "Start network sniffer in background.",
func(args []string) error { func(args []string) error {
return sniff.Start() return sniff.Start()
})) }))
sniff.AddHandler(session.NewModuleHandler("net.sniffer off", "", sniff.AddHandler(session.NewModuleHandler("net.sniff off", "",
"Stop network sniffer in background.", "Stop network sniffer in background.",
func(args []string) error { func(args []string) error {
return sniff.Stop() return sniff.Stop()

View file

@ -34,19 +34,19 @@ func (s *Sniffer) GetContext() (error, *SnifferContext) {
return err, ctx return err, ctx
} }
if err, v := s.Param("net.sniffer.verbose").Get(s.Session); err != nil { if err, v := s.Param("net.sniff.verbose").Get(s.Session); err != nil {
return err, ctx return err, ctx
} else { } else {
ctx.Verbose = v.(bool) ctx.Verbose = v.(bool)
} }
if err, v := s.Param("net.sniffer.local").Get(s.Session); err != nil { if err, v := s.Param("net.sniff.local").Get(s.Session); err != nil {
return err, ctx return err, ctx
} else { } else {
ctx.DumpLocal = v.(bool) ctx.DumpLocal = v.(bool)
} }
if err, v := s.Param("net.sniffer.filter").Get(s.Session); err != nil { if err, v := s.Param("net.sniff.filter").Get(s.Session); err != nil {
return err, ctx return err, ctx
} else { } else {
if ctx.Filter = v.(string); ctx.Filter != "" { if ctx.Filter = v.(string); ctx.Filter != "" {
@ -57,7 +57,7 @@ func (s *Sniffer) GetContext() (error, *SnifferContext) {
} }
} }
if err, v := s.Param("net.sniffer.regexp").Get(s.Session); err != nil { if err, v := s.Param("net.sniff.regexp").Get(s.Session); err != nil {
return err, ctx return err, ctx
} else { } else {
if ctx.Expression = v.(string); ctx.Expression != "" { if ctx.Expression = v.(string); ctx.Expression != "" {
@ -67,7 +67,7 @@ func (s *Sniffer) GetContext() (error, *SnifferContext) {
} }
} }
if err, v := s.Param("net.sniffer.output").Get(s.Session); err != nil { if err, v := s.Param("net.sniff.output").Get(s.Session); err != nil {
return err, ctx return err, ctx
} else { } else {
if ctx.Output = v.(string); ctx.Output != "" { if ctx.Output = v.(string); ctx.Output != "" {