Guest User

Untitled

a guest
Aug 31st, 2016
208
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.40 KB | None | 0 0
  1. diff --git a/src/cracker.c b/src/cracker.c
  2. index 255f95c..46f76f8 100644
  3. --- a/src/cracker.c
  4. +++ b/src/cracker.c
  5. @@ -87,12 +87,12 @@
  6. while (!reassociate()) {
  7. if (assoc_fail_count == MAX_ASSOC_FAILURES) {
  8. assoc_fail_count = 0;
  9. - cprintf(CRITICAL, "[!] WARNING: Failed to associate with %s (ESSID: %s)\n", bssid, get_ssid());
  10. + cprintf(CRITICAL, "[!] \033[1;31mWARNING\033[1;37m: Failed to associate with %s (ESSID: %s)\033[0m\n", bssid, get_ssid());
  11. } else {
  12. assoc_fail_count++;
  13. }
  14. }
  15. - cprintf(INFO, "[+] Associated with %s (ESSID: %s)\n", bssid, get_ssid());
  16. + cprintf(INFO, "[+] \033[1;32mAssociated with \033[1;33m%s (ESSID: %s)\033[0m\n", bssid, get_ssid());
  17.  
  18. /* Used to calculate pin attempt rates */
  19. start_time = time(NULL);
  20. @@ -125,7 +125,7 @@
  21. * Verify that the AP is not locked before attempting the next pin.
  22. */
  23. while (get_ignore_locks() == 0 && is_wps_locked()) {
  24. - cprintf(WARNING, "[!] WARNING: Detected AP rate limiting, waiting %d seconds before re-checking\n", get_lock_delay());
  25. + cprintf(WARNING, "[!] \033[1;33mWARNING\033[1;37m: Detected AP rate limiting, waiting %d seconds before re-checking\033[0m\n", get_lock_delay());
  26. pcap_sleep(get_lock_delay());
  27.  
  28. }
  29. @@ -143,7 +143,7 @@
  30. cprintf(CRITICAL, "[-] Failed to generate the next payload\n");
  31. break;
  32. } else {
  33. - cprintf(WARNING, "[+] Trying pin %s.\n", pin);
  34. + cprintf(WARNING, "[+] \033[1;32mTrying pin \033[1;36m%s\033[0m\n", pin);
  35. }
  36.  
  37. /*
  38. @@ -154,7 +154,7 @@
  39. while (!reassociate()) {
  40. if (assoc_fail_count == MAX_ASSOC_FAILURES) {
  41. assoc_fail_count = 0;
  42. - cprintf(CRITICAL, "[!] WARNING: Failed to associate with %s (ESSID: %s)\n", bssid, get_ssid());
  43. + cprintf(CRITICAL, "[!] \033[1;33mWARNING\033[1;37m: Failed to associate with %s (ESSID: %s)\033[0m\n", bssid, get_ssid());
  44. } else {
  45. assoc_fail_count++;
  46. }
  47. @@ -211,7 +211,7 @@
  48.  
  49. /* If we've had an excessive number of message failures in a row, print a warning */
  50. if (fail_count == WARN_FAILURE_COUNT) {
  51. - cprintf(WARNING, "[!] WARNING: %d failed connections in a row\n", fail_count);
  52. + cprintf(WARNING, "[!] \033[1;33mWARNING\033[1;37m: %d failed connections in a row\033[0m\n", fail_count);
  53. fail_count = 0;
  54. pcap_sleep(get_fail_delay());
  55. }
  56. @@ -387,7 +387,7 @@
  57. }
  58.  
  59.  
  60. - cprintf(INFO, "[+] %.2f%% complete. Elapsed time: %id%ih%im%is.\n", percentage, days, hours, minutes, seconds);
  61. + cprintf(INFO, "[+] \033[1;33m%.2f%% complete. Elapsed time: %id%ih%im%is.\033[0m\n", percentage, days, hours, minutes, seconds);
  62. if (last_display && attempts != last_attempts) {
  63. expected = ((now - last_display) / (attempts - last_attempts)) * (get_max_pin_attempts() - attempts);
  64. if (expected > 0) {
  65. diff --git a/src/exchange.c b/src/exchange.c
  66. index ce7ac41..beaf16f 100644
  67. --- a/src/exchange.c
  68. +++ b/src/exchange.c
  69. @@ -84,7 +84,7 @@
  70. id_response_sent = 1;
  71. break;
  72. case M1:
  73. - cprintf(VERBOSE, "[+] Received M1 message\n");
  74. + cprintf(VERBOSE, "[+] Received \033[1;35mM1\033[0m message\n");
  75. if (id_response_sent && !m2_sent) {
  76. tx_type = SEND_M2;
  77. m2_sent = 1;
  78. @@ -94,7 +94,7 @@
  79. }
  80. break;
  81. case M3:
  82. - cprintf(VERBOSE, "[+] Received M3 message\n");
  83. + cprintf(VERBOSE, "[+] Received \033[1;35mM3\033[0m message\n");
  84. if (m2_sent && !m4_sent) {
  85. if (globule->pixie_loop == 1) {
  86. tx_type = SEND_WSC_NACK;
  87. @@ -111,7 +111,7 @@
  88. }
  89. break;
  90. case M5:
  91. - cprintf(VERBOSE, "[+] Received M5 message\n");
  92. + cprintf(VERBOSE, "[+] Received \033[1;35mM5\033[0m message\n");
  93. if (get_key_status() == KEY1_WIP) {
  94. set_key_status(KEY2_WIP);
  95. }
  96. @@ -124,7 +124,7 @@
  97. }
  98. break;
  99. case M7:
  100. - cprintf(VERBOSE, "[+] Received M7 message\n");
  101. + cprintf(VERBOSE, "[+] Received \033[1;35mM7\033[0m message\n");
  102. //bug fix made by flatr0ze
  103. if (!m6_sent) {
  104. tx_type = SEND_WSC_NACK;
  105. diff --git a/src/wps/wps_enrollee.c b/src/wps/wps_enrollee.c
  106. index 36b3372..f383052 100755
  107. --- a/src/wps/wps_enrollee.c
  108. +++ b/src/wps/wps_enrollee.c
  109. @@ -113,7 +113,7 @@
  110. wpa_hexdump(MSG_DEBUG, "WPS: Enrollee Nonce",
  111. wps->nonce_e, WPS_NONCE_LEN);
  112.  
  113. - wpa_printf(MSG_DEBUG, "WPS: Building Message M1");
  114. + wpa_printf(MSG_DEBUG, "WPS: Building Message \033[1;35mM1\033[0m");
  115. msg = wpabuf_alloc(1000);
  116. if (msg == NULL)
  117. return NULL;
  118. @@ -146,7 +146,7 @@
  119. static struct wpabuf * wps_build_m3(struct wps_data *wps) {
  120. struct wpabuf *msg;
  121.  
  122. - wpa_printf(MSG_DEBUG, "WPS: Building Message M3");
  123. + wpa_printf(MSG_DEBUG, "WPS: Building Message \033[1;35mM3\033[0m");
  124.  
  125. if (wps->dev_password == NULL) {
  126. wpa_printf(MSG_DEBUG, "WPS: No Device Password available");
  127. @@ -174,7 +174,7 @@
  128. static struct wpabuf * wps_build_m5(struct wps_data *wps) {
  129. struct wpabuf *msg, *plain;
  130.  
  131. - wpa_printf(MSG_DEBUG, "WPS: Building Message M5");
  132. + wpa_printf(MSG_DEBUG, "WPS: Building Message \033[1;35mM5\033[0m");
  133.  
  134. plain = wpabuf_alloc(200);
  135. if (plain == NULL)
  136. @@ -261,7 +261,7 @@
  137. static struct wpabuf * wps_build_m7(struct wps_data *wps) {
  138. struct wpabuf *msg, *plain;
  139.  
  140. - wpa_printf(MSG_DEBUG, "WPS: Building Message M7");
  141. + wpa_printf(MSG_DEBUG, "WPS: Building Message \033[1;35mM7\033[0m");
  142.  
  143. plain = wpabuf_alloc(500 + wps->wps->ap_settings_len);
  144. if (plain == NULL)
  145. @@ -703,7 +703,7 @@
  146. const struct wpabuf *msg,
  147. struct wps_parse_attr *attr) {
  148.  
  149. - wpa_printf(MSG_DEBUG, "WPS: Received M2");
  150. + wpa_printf(MSG_DEBUG, "WPS: Received \033[1;35mM2\033[0m");
  151.  
  152. if (wps->state != RECV_M2) {
  153. wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for "
  154. @@ -798,7 +798,7 @@
  155. struct wpabuf *decrypted;
  156. struct wps_parse_attr eattr;
  157.  
  158. - wpa_printf(MSG_DEBUG, "WPS: Received M4");
  159. + wpa_printf(MSG_DEBUG, "WPS: Received \033[1;35mM4\033[0m");
  160.  
  161. if (wps->state != RECV_M4) {
  162. wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for "
  163. @@ -845,7 +845,7 @@
  164. struct wpabuf *decrypted;
  165. struct wps_parse_attr eattr;
  166.  
  167. - wpa_printf(MSG_DEBUG, "WPS: Received M6");
  168. + wpa_printf(MSG_DEBUG, "WPS: Received \033[1;35mM6\033[0m");
  169.  
  170. if (wps->state != RECV_M6) {
  171. wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for "
  172. diff --git a/src/wps/wps_registrar.c b/src/wps/wps_registrar.c
  173. index ff7d3d2..9c77691 100644
  174. --- a/src/wps/wps_registrar.c
  175. +++ b/src/wps/wps_registrar.c
  176. @@ -1521,7 +1521,7 @@
  177. case SEND_M2:
  178. if (wps_get_dev_password(wps) >= 0) {
  179. msg = wps_build_m2(wps);
  180. - cprintf(VERBOSE, "[+] Sending M2 message\n");
  181. + cprintf(VERBOSE, "[+] Sending \033[1;35mM2\033[0m message\n");
  182. *op_code = WSC_MSG;
  183. break;
  184. }
  185. @@ -1533,17 +1533,17 @@
  186. break;
  187. case SEND_M4:
  188. msg = wps_build_m4(wps);
  189. - cprintf(VERBOSE, "[+] Sending M4 message\n");
  190. + cprintf(VERBOSE, "[+] Sending \033[1;35mM4\033[0m message\n");
  191. *op_code = WSC_MSG;
  192. break;
  193. case SEND_M6:
  194. msg = wps_build_m6(wps);
  195. - cprintf(VERBOSE, "[+] Sending M6 message\n");
  196. + cprintf(VERBOSE, "[+] Sending \033[1;35mM6\033[0m message\n");
  197. *op_code = WSC_MSG;
  198. break;
  199. case SEND_M8:
  200. msg = wps_build_m8(wps);
  201. - cprintf(VERBOSE, "[+] Sending M8 message\n");
  202. + cprintf(VERBOSE, "[+] Sending \033[1;35mM8\033[0m message\n");
  203. *op_code = WSC_MSG;
  204. break;
  205. case RECV_DONE:
  206. @@ -2429,7 +2429,7 @@
  207. static enum wps_process_res wps_process_m3(struct wps_data *wps,
  208. const struct wpabuf *msg,
  209. struct wps_parse_attr *attr) {
  210. - wpa_printf(MSG_DEBUG, "WPS: Received M3");
  211. + wpa_printf(MSG_DEBUG, "WPS: Received \033[1;35mM3\033[0m");
  212.  
  213. if (wps->state != RECV_M3) {
  214. wpa_printf(MSG_DEBUG, "WPS: Unexpected state (%d) for "
  215. diff --git a/src/wpsmon.c b/src/wpsmon.c
  216. index 4010b6f..a26c657 100644
  217. --- a/src/wpsmon.c
  218. +++ b/src/wpsmon.c
  219. @@ -259,8 +259,8 @@
  220.  
  221. if (!header_printed) {
  222. if (o_file_p == 0) {
  223. - cprintf(INFO, "BSSID Channel RSSI WPS Version WPS Locked ESSID\n");
  224. - cprintf(INFO, "--------------------------------------------------------------------------------------\n");
  225. + cprintf(INFO, "\033[1;33mBSSID Channel RSSI Version Locked ESSID\033[0m\n");
  226. + cprintf(INFO, "\033[1;32m----------------------------------------------------------------------\033[0m\n");
  227. header_printed = 1;
  228. }
  229.  
  230. @@ -451,7 +451,7 @@
  231.  
  232.  
  233. if (o_file_p == 0) {
  234. - cprintf(INFO, "%17s %2d %.2d %d.%d %s %s\n", bssid, channel, rssi, (wps->version >> 4), (wps->version & 0x0F), lock_display, ssid);
  235. + cprintf(INFO, "%17s %2d %.2d %d.%d %s %s\n", bssid, channel, rssi, (wps->version >> 4), (wps->version & 0x0F), lock_display, ssid);
  236. } else {
  237. if (get_chipset_output == 1) {
  238. cprintf(INFO, "%17s|%2d|%.2d|%d.%d|%s|%s|%s|%s|%s\n", bssid, channel, rssi, (wps->version >> 4), (wps->version & 0x0F), lock_display, ssid, info_manufac, info_modelnum, info_modelserial);
Advertisement
Add Comment
Please, Sign In to add comment