Advertisement
Guest User

Untitled

a guest
Dec 12th, 2017
304
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.84 KB | None | 0 0
  1. title CONNECTING TO SQL/IRC CLIENT
  2. color 1
  3. echo 01011001011011110111010100100000011100
  4. echo 10011001010110000101101100011011000111
  5. echo 10010010000001101000011000010111011001
  6. echo 10010100100000011101000110111100100000
  7. echo 01101101011101010110001101101000001000
  8. echo www.sql.database.REF///HTTP:?LOGINS
  9. echo 00000110111101101110001000000111100101
  10. echo 10111101110101011100100010000001101000
  11. echo 01100001011011100110010001110011001000
  12. echo 00001110100010110100101001001000000101
  13. color 2
  14. echo 01000110100001100001011011100110101101
  15. echo 11001100100000011001100110111101110010
  16. echo 0www.sql.database.REF///HTTP:?LOGINS
  17. echo 01010010000001010011011011110110001101
  18. echo 10100101100001011011000010110101000101
  19. echo 01101110011001110110100101101110011001
  20. echo 01011001010111001000100000010101000110
  21. echo 11110110111101101100011010110110100101
  22. echo 11010000100000001010100110100001110101
  23. color 3
  24. echo 01011001011011110111010100100000011100
  25. echo 10011001010110000101101100011011000111
  26. echo www.sql.database.REF///HTTP:?LOGINS
  27. echo 10010100100000011101000110111100100000
  28. echo 01101101011101010110001101101000001000
  29. echo 00011101000110100101101101011001010010
  30. echo 00000110111101101110001000000111100101
  31. echo 10111101110101011100100010000001101000
  32. echo 01100001011011100110010001110011001000
  33. echo 00001110100010110100101001001000000101
  34. color 4
  35. echo 01010010000001010011011011110110001101
  36. echo 10100101100001011011000010110101000101
  37. echo 01101110011001110110100101101110011001
  38. echo 01011001010111001000100000010101000110
  39. echo 11110110111101101100011010110110100101
  40. echo 11010000100000001010100110100001110101
  41. echo 011001110111001100101010
  42. echo 01011001011011110111010100100000011100
  43. echo 10011001010110000101101100011011000111
  44. echo 10010010000001101000011000010111011001
  45. echo 10010100100000011101000110111100100000
  46. echo 01101101011101010110001101101000001000
  47. echo 00011101000110100101101101011001010010
  48. echo 00000110111101101110001000000111100101
  49. color 5
  50. echo 01011001011011110111010100100000011100
  51. echo 10011001010110000101101100011011000111
  52. echo 10010010000001101000011000010111011001
  53. echo 10010100100000011101000110111100100000
  54. echo 01101101011101010110001101101000001000
  55. echo 00011101000110100101101101011001010010
  56. echo 00000110111101101110001000000111100101
  57. echo 10111101110101011100100010000001101000
  58. echo 01100001011011100110010001110011001000
  59. echo 00001110100010110100101001001000000101
  60. color 6
  61. echo 10111101110101011100100010000001101000
  62. echo 01100001011011100110010001110011001000
  63. echo 00001110100010110100101001001000000101
  64. echo 01000110100001100001011011100110101101
  65. echo 11001100100000011001100110111101110010
  66. echo 00100000011101010111001101101001011011
  67. echo 10011001110010000001110100011010000110
  68. echo 01010010000001010011011011110110001101
  69. echo 10100101100001011011000010110101000101
  70. echo 01101110011001110110100101101110011001
  71. echo 01011001010111001000100000010101000110
  72. echo 11110110111101101100011010110110100101
  73. echo 11010000100000001010100110100001110101
  74. echo 011001110111001100101010echo
  75. echo 10011001010110000101101100011011000111
  76. echo 10010010000001101000011000010111011001
  77. echo 10010100100000011101000110111100100000
  78. echo 01101101011101010110001101101000001000
  79. echo 00011101000110100101101101011001010010
  80. echo 00000110111101101110001000000111100101
  81. echo 10111101110101011100100010000001101000
  82. color 7
  83. echo 01011001011011110111010100100000011100
  84. echo 10011001010110000101101100011011000111
  85. echo 10010010000001101000011000010111011001
  86. echo 10010100100000011101000110111100100000
  87. echo 01101101011101010110001101101000001000
  88. echo 00011101000110100101101101011001010010
  89. echo 00000110111101101110001000000111100101
  90. echo 10111101110101011100100010000001101000
  91. echo 01100001011011100110010001110011001000
  92. echo 00001110100010110100101001001000000101
  93. color 8
  94. echo 10111101110101011100100010000001101000
  95. echo 01100001011011100110010001110011001000
  96. echo 00001110100010110100101001001000000101
  97. echo 01000110100001100001011011100110101101
  98. echo 11001100100000011001100110111101110010
  99. color 9
  100. echo 01011001011011110111010100100000011100
  101. echo 10011001010110000101101100011011000111
  102. echo 10010010000001101000011000010111011001
  103. echo 10010100100000011101000110111100100000
  104. echo 01101101011101010110001101101000001000
  105. echo 00011101000110100101101101011001010010
  106. echo 00000110111101101110001000000111100101
  107. echo 10111101110101011100100010000001101000
  108. echo 01100001011011100110010001110011001000
  109. echo 00001110100010110100101001001000000101
  110. color 1
  111. echo 01011001011011110111010100100000011100
  112. echo 10011001010110000101101100011011000111
  113. echo 10010010000001101000011000010111011001
  114. echo 10010100100000011101000110111100100000
  115. echo 01101101011101010110001101101000001000
  116. echo 00011101000110100101101101011001010010
  117. echo 00000110111101101110001000000111100101
  118. echo 10111101110101011100100010000001101000
  119. echo 01100001011011100110010001110011001000
  120. echo 00001110100010110100101001001000000101
  121. color 2
  122. echo 01000110100001100001011011100110101101
  123. echo 11001100100000011001100110111101110010
  124. echo www.sql.database.REF///HTTP:?LOGINS
  125. echo 10011001110010000001110100011010000110
  126. echo 01010010000001010011011011110110001101
  127. echo www.sql.database.REF///HTTP:?LOGINS
  128. echo 01101110011001110110100101101110011001
  129. echo 01011001010111001000100000010101000110
  130. echo 11110110111101101100011010110110100101
  131. echo 11010000100000001010100110100001110101
  132. color 3
  133. echo 01011001011011110111010100100000011100
  134. echo 10011001010110000101101100011011000111
  135. echo 10010010000001101000011000010111011001
  136. echo 10010100100000011101000110111100100000
  137. echo 01101101011101010110001101101000001000
  138. echo 00011101000110100101101101011001010010
  139. echo 00000110111101101110001000000111100101
  140. echo 10111101110101011100100010000001101000
  141. echo 01100001011011100110010001110011001000
  142. echo 00001110100010110100101001001000000101
  143. color 4
  144. echo 01010010000001010011011011110110001101
  145. echo www.sql.database.REF///HTTP:?LOGINS
  146. echo 01101110011001110110100101101110011001
  147. echo 01011001010111001000100000010101000110
  148. echo 11110110111101101100011010110110100101
  149. echo 11010000100000001010100110100001110101
  150. echo 011001110111001100101010
  151. echo 01011001011011110111010100100000011100
  152. echo 10011001010110000101101100011011000111
  153. echo 10010010000001101000011000010111011001
  154. echo 10010100100000011101000110111100100000
  155. echo 01101101011101010110001101101000001000
  156. echo 00011101000110100101101101011001010010
  157. echo 00000110111101101110001000000111100101
  158. color 5
  159. echo 01011001011011110111010100100000011100
  160. echo 10011001010110000101101100011011000111
  161. echo 10010010000001101000011000010111011001
  162. echo 10010100100000011101000110111100100000
  163. echo www.sql.database.REF///HTTP:?LOGINS
  164. echo 00011101000110100101101101011001010010
  165. echo 00000110111101101110001000000111100101
  166. echo 10111101110101011100100010000001101000
  167. echo 01100001011011100110010001110011001000
  168. echo 00001110100010110100101001001000000101
  169. color 6
  170. echo 10111101110101011100100010000001101000
  171. echo 01100001011011100110010001110011001000
  172. echo 00001110100010110100101001001000000101
  173. echo 01000110100001100001011011100110101101
  174. echo 11001100100000011001100110111101110010
  175. echo 00100000011101010111001101101001011011
  176. echo 10011001110010000001110100011010000110
  177. echo 01010010000001010011011011110110001101
  178. echo www.sql.database.REF///HTTP:?LOGINS
  179. echo 01101110011001110110100101101110011001
  180. echo 01011001010111001000100000010101000110
  181. echo 11110110111101101100011010110110100101
  182. echo 11010000100000001010100110100001110101
  183. echo 011001110111001100101010echo
  184. echo 10011001010110000101101100011011000111
  185. echo 10010010000001101000011000010111011001
  186. echo 10010100100000011101000110111100100000
  187. echo 01101101011101010110001101101000001000
  188. echo 00011101000110100101101101011001010010
  189. echo 00000110111101101110001000000111100101
  190. echo 10111101110101011100100010000001101000
  191. color 7
  192. echo www.sql.database.REF///HTTP:?LOGINS
  193. echo 10010010000001101000011000010111011001
  194. echo 10010100100000011101000110111100100000
  195. echo 01101101011101010110001101101000001000
  196. echo 00011101000110100101101101011001010010
  197. echo www.sql.database.REF///HTTP:?LOGINS
  198. echo 10111101110101011100100010000001101000
  199. echo 01100001011011100110010001110011001000
  200. echo 00001110100010110100101001001000000101
  201. color 8
  202. echo 10111101110101011100100010000001101000
  203. echo 01100001011011100110010001110011001000
  204. echo 00001110100010110100101001001000000101
  205. echo 01000110100001100001011011100110101101
  206. echo 11001100100000011001100110111101110010
  207. color 9
  208. echo 01011001011011110111010100100000011100
  209. echo 10011001010110000101101100011011000111
  210. echo 10010010000001101000011000010111011001
  211. echo www.sql.database.REF///HTTP:?LOGINS
  212. echo 01101101011101010110001101101000001000
  213. echo 00011101000110100101101101011001010010
  214. echo 00000110111101101110001000000111100101
  215. echo www.sql.database.REF///HTTP:?LOGINS
  216. echo 01100001011011100110010001110011001000
  217. echo 00001110100010110100101001001000000101
  218. color 1
  219. echo 01011001011011110111010100100000011100
  220. echo 10011001010110000101101100011011000111
  221. echo 10010010000001101000011000010111011001
  222. echo www.sql.database.REF///HTTP:?LOGINS
  223. echo 01101101011101010110001101101000001000
  224. echo 00011101000110100101101101011001010010
  225. echo 00000110111101101110001000000111100101
  226. echo 10111101110101011100100010000001101000
  227. echo 01100001011011100110010001110011001000
  228. echo 00001110100010110100101001001000000101
  229. color 2
  230. echo 01000110100001100001011011100110101101
  231. echo 11001100100000011001100110111101110010
  232. echo 00100000011101010111001101101001011011
  233. echo 10011001110010000001110100011010000110
  234. echo 01010010000001010011011011110110001101
  235. echo 10100101100001011011000010110101000101
  236. echo 01101110011001110110100101101110011001
  237. echo 01011001010111001000100000010101000110
  238. echo 11110110111101101100011010110110100101
  239. echo www.sql.database.REF///HTTP:?LOGINS
  240. color 3
  241. echo 01011001011011110111010100100000011100
  242. echo 10011001010110000101101100011011000111
  243. echo 10010010000001101000011000010111011001
  244. echo 10010100100000011101000110111100100000
  245. echo 01101101011101010110001101101000001000
  246. echo 00011101000110100101101101011001010010
  247. echo 00000110111101101110001000000111100101
  248. echo 10111101110101011100100010000001101000
  249. echo 01100001011011100110010001110011001000
  250. echo 00001110100010110100101001001000000101
  251. color 4
  252. echo 01010010000001010011011011110110001101
  253. echo 10100101100001011011000010110101000101
  254. echo 01101110011001110110100101101110011001
  255. echo 01011001010111001000100000010101000110
  256. echo 11110110111101101100011010110110100101
  257. echo www.sql.database.REF///HTTP:?LOGINS
  258. echo 011001110111001100101010
  259. echo 01011001011011110111010100100000011100
  260. echo 10011001010110000101101100011011000111
  261. echo 10010010000001101000011000010111011001
  262. echo 10010100100000011101000110111100100000
  263. echo 01101101011101010110001101101000001000
  264. echo 00011101000110100101101101011001010010
  265. echo 00000110111101101110001000000111100101
  266. color 5
  267. echo 01011001011011110111010100100000011100
  268. echo 10011001010110000101101100011011000111
  269. echo 10010010000001101000011000010111011001
  270. echo 10010100100000011101000110111100100000
  271. echo 01101101011101010110001101101000001000
  272. echo 00011101000110100101101101011001010010
  273. echo 00000110111101101110001000000111100101
  274. echo 10111101110101011100100010000001101000
  275. echo 01100001011011100110010001110011001000
  276. echo 00001110100010110100101001001000000101
  277. color 6
  278. echo 10111101110101011100100010000001101000
  279. echo 01100001011011100110010001110011001000
  280. echo 00001110100010110100101001001000000101
  281. echo 01000110100001100001011011100110101101
  282. echo 11001100100000011001100110111101110010
  283. echo 00100000011101010111001101101001011011
  284. echo 10011001110010000001110100011010000110
  285. echo 01010010000001010011011011110110001101
  286. echo 10100101100001011011000010110101000101
  287. echo 01101110011001110110100101101110011001
  288. echo 01011001010111001000100000010101000110
  289. echo www.sql.database.REF///HTTP:?LOGINS
  290. echo 11010000100000001010100110100001110101
  291. echo 011001110111001100101010echo
  292. echo 10011001010110000101101100011011000111
  293. echo 10010010000001101000011000010111011001
  294. echo 10010100100000011101000110111100100000
  295. echo 01101101011101010110001101101000001000
  296. echo 00011101000110100101101101011001010010
  297. echo 00000110111101101110001000000111100101
  298. echo 10111101110101011100100010000001101000
  299. color 7
  300. echo 01011001011011110111010100100000011100
  301. echo 10011001010110000101101100011011000111
  302. echo www.sql.database.REF///HTTP:?LOGINS
  303. echo 10010100100000011101000110111100100000
  304. echo 01101101011101010110001101101000001000
  305. echo 00011101000110100101101101011001010010
  306. echo 00000110111101101110001000000111100101
  307. echo 10111101110101011100100010000001101000
  308. echo 01100001011011100110010001110011001000
  309. echo 00001110100010110100101001001000000101
  310. color 8
  311. echo 10111101110101011100100010000001101000
  312. echo 01100001011011100110010001110011001000
  313. echo 00001110100010110100101001001000000101
  314. echo 01000110100001100001011011100110101101
  315. echo 11001100100000011001100110111101110010
  316. color 9
  317. echo www.sql.database.REF///HTTP:?LOGINS
  318. echo 10011001010110000101101100011011000111
  319. echo 10010010000001101000011000010111011001
  320. echo 10010100100000011101000110111100100000
  321. echo 01101101011101010110001101101000001000
  322. echo 00011101000110100101101101011001010010
  323. echo 00000110111101101110001000000111100101
  324. echo 10111101110101011100100010000001101000
  325. echo 01100001011011100110010001110011001000
  326. echo www.sql.database.REF///HTTP:?LOGINS
  327.  
  328. color 3
  329. cls
  330. @ECHO OFF
  331. title LOGIN
  332. :LOGIN
  333. echo Enter Username To Access Database.
  334. set/p "username=>"
  335. if NOT %username%==***** goto FAIL
  336. echo Enter Password To Access Database.
  337. set/p "pass=>"
  338. if NOT %pass%==***** goto FAIL
  339. if %pass%==admin goto LOGGEDIN
  340. cls
  341. :FAIL
  342. echo Invalid username or password.
  343. goto LOGIN
  344. cls
  345. :LOGGEDIN
  346. cls
  347. @ECHO OFF
  348. title root@$~Project 'Underground' VERSION 1.0.0~$
  349. echo Bots Online :43625
  350. echo Pearls Avaliable: 5646487365326490000
  351. echo Welcome To Akoya's Linux Project 'Underground'.
  352.  
  353. echo There is a no new version of PU available.
  354. echo Your version: 1.0.0
  355. echo Current version: 1.0.0
  356.  
  357. echo Select from the menu:
  358.  
  359. echo 1) Social-Engineering Attacks
  360. echo 2) Penetration Testing (Fast-Track)
  361. echo 3) Third Party Modules
  362. echo 4) Check For Updates For Project Underground
  363. echo 5) Update SET configuration
  364. echo 6) Help, Credits, and About
  365.  
  366. echo 99) Exit Project Underground
  367. :CONFIRM
  368. echo Choose Option (1-6 //99)
  369. set/p "cho=>"
  370. if %cho%==1 goto ONE
  371. if %cho%==4 goto FOUR
  372. if %cho%==6 goto SIX
  373. if %cho%==99 goto End
  374.  
  375. :SIX
  376. echo Credits; Big Thanks To Kitty For Helping Me With This Project.
  377. echo Made By; Akoya.
  378. echo About; This Is A Linux Based Database Tool For Windows For Vector Attacks.
  379. pause
  380. goto LOGGEDIN
  381. CLS
  382.  
  383.  
  384. :FOUR
  385. echo ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  386. echo ! No Updates Found, You Are Runnning The Current Version. !
  387. echo ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  388. pause
  389. goto LOGGEDIN
  390. CLS
  391.  
  392. :ONE
  393. echo www.sql.database.REF///HTTP:?GRAB.SET
  394. echo www.sql.database.REF///HTTP:?LOGINS
  395. echo www.sql.database.REF///HTTP:?GRAB.SET
  396. echo www.sql.database.REF///HTTP:?LOGINS
  397. echo www.sql.database.REF///HTTP:?GRAB.SET
  398. echo 10011001010110000101101100011011000111
  399. echo 10010010000001101000011000010111011001
  400. echo 10010100100000011101000110111100100000
  401. echo 01101101011101010110001101101000001000
  402. echo 00011101000110100101101101011001010010
  403. echo 00000110111101101110001000000111100101
  404. echo 10111101110101011100100010000001101000
  405. echo 01100001011011100110010001110011001000
  406. echo www.sql.database.REF///HTTP:?LOGINS
  407. echo www.sql.database.REF///HTTP:?GRAB.SET
  408. echo www.sql.database.REF///HTTP:?LOGINS
  409. echo www.sql.database.REF///HTTP:?GRAB.SET
  410. echo 10011001010110000101101100011011000111
  411. echo 10010010000001101000011000010111011001
  412. echo 10010100100000011101000110111100100000
  413. echo 01101101011101010110001101101000001000
  414. echo 00011101000110100101101101011001010010
  415. echo 00000110111101101110001000000111100101
  416. echo 10111101110101011100100010000001101000
  417. echo 01100001011011100110010001110011001000
  418. echo www.sql.database.REF///HTTP:?LOGINS
  419. echo www.sql.database.REF///HTTP:?GRAB.SET
  420. echo www.sql.database.REF///HTTP:?LOGINS
  421. echo www.sql.database.REF///HTTP:?GRAB.SET
  422. echo www.sql.database.REF///HTTP:?LOGINS
  423. echo www.sql.database.REF///HTTP:?GRAB.SET
  424. echo www.sql.database.REF///HTTP:?LOGINS
  425. echo www.sql.database.REF///HTTP:?GRAB.SET
  426. echo www.sql.database.REF///HTTP:?LOGINS
  427. echo 10011001010110000101101100011011000111
  428. echo 10010010000001101000011000010111011001
  429. echo 10010100100000011101000110111100100000
  430. echo 01101101011101010110001101101000001000
  431. echo 00011101000110100101101101011001010010
  432. echo 00000110111101101110001000000111100101
  433. echo 10111101110101011100100010000001101000
  434. echo 01100001011011100110010001110011001000
  435. echo www.sql.database.REF///HTTP:?GRAB.SET
  436. echo www.sql.database.REF///HTTP:?LOGINS
  437. echo www.sql.database.REF///HTTP:?GRAB.SET
  438. echo www.sql.database.REF///HTTP:?LOGINS
  439. echo www.sql.database.REF///HTTP:?GRAB.SET
  440. echo www.sql.database.REF///HTTP:?LOGINS
  441. echo 10011001010110000101101100011011000111
  442. echo 10010010000001101000011000010111011001
  443. echo 10010100100000011101000110111100100000
  444. echo 01101101011101010110001101101000001000
  445. echo 00011101000110100101101101011001010010
  446. echo 00000110111101101110001000000111100101
  447. echo 10111101110101011100100010000001101000
  448. echo 01100001011011100110010001110011001000
  449. echo 01100111011100110010101000000001000001
  450.  
  451.  
  452.  
  453. echo
  454. echo [---] Project Underground [---]
  455. echo [---] Created by: Akoya [---]
  456. echo Version: 1.0.0
  457. echo Project Codename: 'Underground'
  458. echo [---] Follow me on Twitter: @JadeAkoya [---]
  459.  
  460. echo Welcome to the Project Underground.
  461. echo Select from the menu:
  462.  
  463. echo 1) Spear-Phishing Attack Vectors
  464. echo 2) Website Attack Vectors
  465. echo 3) Infectious Media Generator
  466. echo 4) Create a Payload and Listener
  467. echo 5) Mass Mailer Attack
  468. echo 6) Arduino-Based Attack Vector
  469. echo 7) Wireless Access Point Attack Vector
  470. echo 8) QRCode Generator Attack Vector
  471. echo 9) Powershell Attack Vectors
  472. echo 10) SMS Spoofing Attack Vector
  473. echo 11) Third Party Modules
  474.  
  475. echo 99) Return back to the main menu.
  476. echo Choose Option (1-11 //99)
  477. set/p "cho=>"
  478. if %cho%==1 goto TWO1
  479. if %cho%==99 goto LOGGEDIN
  480.  
  481.  
  482.  
  483. :TWO1
  484. echo The Web Attack module is a unique way of utilizing multiple web-based attacks in order to compromise the intended victim.
  485.  
  486. echo
  487.  
  488. echo The Java Applet Attack method will spoof a Java Certificate and deliver a metasploit based payload. Uses a customized java applet created by Thomas Werth to deliver the payload.
  489.  
  490. echo
  491.  
  492.  
  493. echo The Metasploit Browser Exploit method will utilize select Metasploit browser exploits through an iframe and deliver a Metasploit payload.
  494.  
  495. echo
  496.  
  497.  
  498. echo The Credential Harvester method will utilize web cloning of a web- site that has a username and password field and harvest all the information posted to the website.
  499.  
  500. echo
  501.  
  502.  
  503. echo The TabNabbing method will wait for a user to move to a different tab, then refresh the page to something different.
  504.  
  505. echo
  506.  
  507.  
  508. echo The Web-Jacking Attack method was introduced by white_sheep, emgent. This method utilizes iframe replacements to make the highlighted URL echo link to appear legitimate however when clicked a window pops up then is replaced with the malicious link. You can edit the link echo replacement settings in the set_config if its too slow/fast.
  509.  
  510. echo
  511.  
  512.  
  513. echo The Multi-Attack method will add a combination of attacks through the web attack menu. For example you can utilize the Java Applet, echo Metasploit Browser, Credential Harvester/Tabnabbing all at once to echo see which is successful.
  514.  
  515. echo
  516.  
  517.  
  518. echo The HTA Attack method will allow you to clone a site and perform powershell injection through HTA files which can be used for Windows-based powershell exploitation through the browser.
  519.  
  520. echo
  521.  
  522.  
  523. echo 1) Java Applet Attack Method
  524. echo 2) Metasploit Browser Exploit Method
  525. echo 3) Credential Harvester Attack Method
  526. echo 4) Tabnabbing Attack Method
  527. echo 5) Web Jacking Attack Method
  528. echo 6) Multi-Attack Web Method
  529. echo 7) Full Screen Attack Method
  530. echo 8) HTA Attack Method
  531.  
  532. echo 99) Return to Main Menu
  533. echo Choose Option (1-8 //99)
  534. set/p "cho=Attack>:"
  535. if %cho%==1 goto ONE2
  536. if %cho%==1 goto TWO2
  537. if %cho%==99 goto LOGGEDIN
  538. if %cho%==5 goto FIVE
  539.  
  540. :FIVE
  541. echo The first method will allow SET to import a list of pre-defined web
  542. echo applications that it can utilize within the attack.
  543.  
  544. echo The second method will completely clone a website of your choosing
  545. echo and allow you to utilize the attack vectors within the completely
  546. echo same web application you were attempting to clone.
  547.  
  548. echo The third method allows you to import your own website, note that you
  549. echo should only have an index.html when using the import website
  550. echo functionality.
  551.  
  552. echo
  553. echo Choose Option (1-3 //99)
  554. echo 1) Web Templates
  555. echo 2) Site Cloner
  556. echo 3) Custom Import
  557. echo
  558. echo 99) Return to Main Menu
  559. set/p "cho=Set:Webattack>:"
  560.  
  561. echo 99) Return to Webattack Menu
  562.  
  563.  
  564. if %cho%==99 goto LOGGEDIN
  565.  
  566.  
  567. :End
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement