mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2024-12-20 17:53:17 +00:00
48 lines
1.6 KiB
Python
48 lines
1.6 KiB
Python
#!/usr/bin/env python
|
|
|
|
import subprocess
|
|
import os
|
|
import sys
|
|
from src.core.setcore import *
|
|
|
|
#########################
|
|
# Simple signer for signing the java applet attack
|
|
#########################
|
|
|
|
# create Key: keytool -genkey -alias signapplet -keystore mykeystore -keypass mykeypass -storepass mystorepass
|
|
# sign: jarsigner -keystore mykeystore -storepass mystorepass -keypass mykeypass -signedjar SignedMicrosoft.jar oMicrosoft.jar signapplet
|
|
|
|
os.chdir("src/html/unsigned")
|
|
|
|
print """
|
|
Simply enter in the required fields, easy example below:
|
|
|
|
Name: FakeCompany
|
|
Organization: Fake Company
|
|
Organization Name: Fake Company
|
|
City: Cleveland
|
|
State: Ohio
|
|
Country: US
|
|
Is this correct: yes
|
|
"""
|
|
|
|
print_error("*** WARNING ***")
|
|
print_error("IN ORDER FOR THIS TO WORK YOU MUST INSTALL sun-java6-jdk or openjdk-6-jdk, so apt-get install openjdk-6-jdk")
|
|
print_error("*** WARNING ***")
|
|
|
|
# random string used to generate signature of java applet
|
|
random_string = generate_random_string(10, 30)
|
|
|
|
# grab keystore to use later
|
|
subprocess.Popen("keytool -genkey -alias %s -keystore mykeystore -keypass mykeypass -storepass mystorepass" % (random_string), shell=True).wait()
|
|
|
|
# self-sign the applet
|
|
subprocess.Popen("jarsigner -keystore mykeystore -storepass mystorepass -keypass mykeypass -signedjar Signed_Update.jar unsigned.jar %s" % (random_string), shell=True).wait()
|
|
|
|
# move it into our html directory
|
|
subprocess.Popen("cp Signed_Update.jar ../", shell=True).wait()
|
|
subprocess.Popen("mv Signed_Update.jar " + setdir, shell=True)
|
|
|
|
# move back to original directory
|
|
os.chdir("../../../")
|
|
print_status("Java Applet is now signed and will be imported into the website")
|