Merge pull request #172 from ghost/master

path-1 forwarding ports with meterpreter API using namespaces with gui supported C# program. look at open ai.lnk file to see more.
This commit is contained in:
Harshil 2017-12-28 18:21:23 +05:30 committed by GitHub
commit 59dab56d58
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 57 additions and 0 deletions

View File

@ -12,3 +12,17 @@ max_length = 16
password = ''.join(random.choice(chars) for x in range(random.randint(min_length, max_length)))
print('Password: ' + password)
print('[ If you are thinking of using this passsword, You better save it. ]')
# ALTERNATIVE METHODS
# ctbi= characters that must be in password
# i= how many letters or characters the password length will be
def password_generator(ctbi, i):
# Password generator = full boot with random_number, random_letters, and random_character FUNCTIONS
def random_number(ctbi, i):
def random_letters(ctbi, i):
def random_characters(ctbi, i):

43
server.py Normal file
View File

@ -0,0 +1,43 @@
# all imports - including #s
import socket
#import os
#import sys
#import subprocess
# end of imports
# the below classes will clarify what information is for the attacker and client
class Termrequire:
host = socket.gethostname()
port = 3333 # fake numeral for the moment
class Clientrequire:
host = socket.gethostname()
port = 2222 # fake numeral for the moment
#CORE REQUIREMENTS OF PROGRAM:
### host ip = server ip
### potential connection hosts info (host, port)
### user.config
### user.config
# using SERVER for connections and linux meterpreter sessions
# SERVER DETAILS:
#5 client availability for pivoting #although that is not yet available in a regular form of
#exploitation - we have to go with what we have.
# #learnmore - USER_CONFIG
# server ip will be displayed every connection at version 2.0
# terminal attacker socket object creation
t = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
# terminal attacker socket binding
t.bind()
# terminal attacker socket listen
t.listen()
# client socket object creation
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
# binding information with s.bind method
s.bind()
#listening for connections with s.listen method
s.listen(1)
# server_functionality waits for terminal shell and then gets client information connectivity
def func4client():
s.accept()
# terminal functionality for attacker - I will definitely customize it soon. Maybe tkinter?
def func4term():
t.accept()