mirror of
https://hub.njuu.cf/TheAlgorithms/Python.git
synced 2023-10-11 13:06:12 +08:00
Merge pull request #172 from ghost/master
path-1 forwarding ports with meterpreter API using namespaces with gui supported C# program. look at open ai.lnk file to see more.
This commit is contained in:
commit
59dab56d58
@ -12,3 +12,17 @@ max_length = 16
|
||||
password = ''.join(random.choice(chars) for x in range(random.randint(min_length, max_length)))
|
||||
print('Password: ' + password)
|
||||
print('[ If you are thinking of using this passsword, You better save it. ]')
|
||||
# ALTERNATIVE METHODS
|
||||
# ctbi= characters that must be in password
|
||||
# i= how many letters or characters the password length will be
|
||||
def password_generator(ctbi, i):
|
||||
# Password generator = full boot with random_number, random_letters, and random_character FUNCTIONS
|
||||
def random_number(ctbi, i):
|
||||
|
||||
|
||||
|
||||
def random_letters(ctbi, i):
|
||||
|
||||
|
||||
|
||||
def random_characters(ctbi, i):
|
||||
|
43
server.py
Normal file
43
server.py
Normal file
@ -0,0 +1,43 @@
|
||||
# all imports - including #s
|
||||
import socket
|
||||
#import os
|
||||
#import sys
|
||||
#import subprocess
|
||||
# end of imports
|
||||
# the below classes will clarify what information is for the attacker and client
|
||||
class Termrequire:
|
||||
host = socket.gethostname()
|
||||
port = 3333 # fake numeral for the moment
|
||||
class Clientrequire:
|
||||
host = socket.gethostname()
|
||||
port = 2222 # fake numeral for the moment
|
||||
#CORE REQUIREMENTS OF PROGRAM:
|
||||
### host ip = server ip
|
||||
### potential connection hosts info (host, port)
|
||||
### user.config
|
||||
### user.config
|
||||
# using SERVER for connections and linux meterpreter sessions
|
||||
# SERVER DETAILS:
|
||||
#5 client availability for pivoting #although that is not yet available in a regular form of
|
||||
#exploitation - we have to go with what we have.
|
||||
|
||||
# #learnmore - USER_CONFIG
|
||||
# server ip will be displayed every connection at version 2.0
|
||||
# terminal attacker socket object creation
|
||||
t = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
# terminal attacker socket binding
|
||||
t.bind()
|
||||
# terminal attacker socket listen
|
||||
t.listen()
|
||||
# client socket object creation
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
# binding information with s.bind method
|
||||
s.bind()
|
||||
#listening for connections with s.listen method
|
||||
s.listen(1)
|
||||
# server_functionality waits for terminal shell and then gets client information connectivity
|
||||
def func4client():
|
||||
s.accept()
|
||||
# terminal functionality for attacker - I will definitely customize it soon. Maybe tkinter?
|
||||
def func4term():
|
||||
t.accept()
|
Loading…
Reference in New Issue
Block a user