Skip to content
This repository has been archived by the owner on Apr 19, 2020. It is now read-only.

Commit

Permalink
fixed Windows UpdateFake modules
Browse files Browse the repository at this point in the history
  • Loading branch information
mh4x0f committed Aug 8, 2017
1 parent 12914aa commit 144e219
Show file tree
Hide file tree
Showing 10 changed files with 20 additions and 18 deletions.
1 change: 1 addition & 0 deletions CHANGELOG
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@ Version 0.8.5
- fixed [Errno socket error] [Errno -2] Name or service not known #252
- fixed control lock/unlock plugins tabs when changes options
- fixed PhishingManager error when try shutdown httpd server
- fixed Windows UpdateFake modules

Version 0.8.4
-------------
Expand Down
1 change: 1 addition & 0 deletions core/config/commits/Lcommits.cfg
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ master:
{ changelog : 'fixed [Errno socket error] [Errno -2] Name or service not known #252' },
{ changelog : 'fixed control lock/unlock plugins tabs when changes options' },
{ changelog : 'fixed PhishingManager error when try shutdown httpd server' },
{ changelog : 'fixed Windows UpdateFake modules' },
]

WiFiPumpkin084:
Expand Down
6 changes: 2 additions & 4 deletions core/loaders/checker/depedences.py
Original file line number Diff line number Diff line change
Expand Up @@ -14,10 +14,8 @@ def check_dep_pumpkin():
hostapd = popen('which hostapd').read().split('\n')
if not path.isfile(hostapd[0]): notinstall('hostapd')
# checck source.tar.gz tamplate module
if not path.isfile('templates/Update/Windows_Update/Settins_WinUpdate.html'):
copy('settings/source.tar.gz','templates/')
system('cd templates/ && tar -xf source.tar.gz')
remove('templates/source.tar.gz')
if not path.isfile('templates/fakeupdate/Windows_Update/Settins_WinUpdate.html'):
system('cd templates/ && tar -xf fakeupdate.tar.gz')

# check if hostapd is found and save path
settings = SettingsINI('core/config/app/config.ini')
Expand Down
5 changes: 3 additions & 2 deletions core/main.py
Original file line number Diff line number Diff line change
Expand Up @@ -1372,7 +1372,7 @@ def Start_PumpAP(self):
self.CoreSettings()
self.checkWirelessSecurity() # check if user set wireless password
ignore = ('interface=','ssid=','channel=')
with open('settings/hostapd.conf','w') as apconf:
with open('core/config/hostapd/hostapd.conf','w') as apconf:
for i in self.SettingsAP['hostapd']:apconf.write(i)
for config in str(self.FSettings.ListHostapd.toPlainText()).split('\n'):
if not config.startswith('#') and len(config) > 0:
Expand All @@ -1381,7 +1381,8 @@ def Start_PumpAP(self):
apconf.close()

# create thread for hostapd and connect GetHostapdStatus function
self.Thread_hostapd = ProcessHostapd({self.hostapd_path:[getcwd()+'/settings/hostapd.conf']}, self.currentSessionID)
self.Thread_hostapd = ProcessHostapd({self.hostapd_path:[getcwd()+
'/core/config/hostapd/hostapd.conf']}, self.currentSessionID)
self.Thread_hostapd.setObjectName('hostapd')
self.Thread_hostapd.statusAP_connected.connect(self.GetHostapdStatus)
self.Thread_hostapd.statusAPError.connect(self.GetErrorhostapdServices)
Expand Down
8 changes: 4 additions & 4 deletions modules/servers/PhishingManager.py
Original file line number Diff line number Diff line change
Expand Up @@ -222,7 +222,7 @@ def start_server(self):
if self.checkRequests(site):
self.ServerHTTPLoad = ServerThreadHTTP(str(self.txt_redirect.text()),
self.BoxPort.value(),redirect=str(self.cloneLineEdit.text()),
directory='templates/Phishing/web_server/index.html',session=self.session)
directory='templates/phishing/web_server/index.html',session=self.session)
self.ThreadTemplates['Server'].append(self.ServerHTTPLoad)
self.ServerHTTPLoad.requestHTTP.connect(self.ResponseSignal)
self.btn_start_template.setEnabled(False)
Expand All @@ -241,10 +241,10 @@ def start_server(self):

elif self.check_custom.isChecked():
self.html = BeautifulSoup(self.txt_html.toPlainText())
self.CheckHookInjection(self.html,'templates/Phishing/custom/index.html')
self.CheckHookInjection(self.html,'templates/phishing/custom/index.html')
self.ServerHTTPLoad = ServerThreadHTTP(str(self.txt_redirect.text()),
self.BoxPort.value(),redirect=str(self.cloneLineEdit.text()),
directory='templates/Phishing/custom/index.html',session=self.session)
directory='templates/phishing/custom/index.html',session=self.session)
self.ThreadTemplates['Server'].append(self.ServerHTTPLoad)
self.ServerHTTPLoad.requestHTTP.connect(self.ResponseSignal)
self.btn_start_template.setEnabled(False)
Expand Down Expand Up @@ -291,7 +291,7 @@ def checkRequests(self,siteName):
for tag in request.find_all('form'):
tag['method'],tag['action'] ='post',''
except Exception: pass
self.CheckHookInjection(request,'templates/Phishing/web_server/index.html')
self.CheckHookInjection(request,'templates/phishing/web_server/index.html')
except URLError:
QMessageBox.warning(self,'Request HTTP','It seems like the server is down.')
return False
Expand Down
17 changes: 9 additions & 8 deletions modules/spreads/UpdateFake.py
Original file line number Diff line number Diff line change
Expand Up @@ -138,10 +138,10 @@ def GUI(self):
self.setLayout(self.Main)

def removefiles(self):
pathList = ['templates/Update/Windows_Update/index.html',
'templates/Update/Windows_Update/windows-update.exe',
'templates/Update/Java_Update/index.html',
'templates/Update/Java_Update/java-update.exe']
pathList = ['templates/fakeupdate/Windows_Update/index.html',
'templates/fakeupdate/Windows_Update/windows-update.exe',
'templates/fakeupdate/Java_Update/index.html',
'templates/fakeupdate/Java_Update/java-update.exe']
for i in pathList:
if path.isfile(i):remove(i)

Expand All @@ -152,6 +152,7 @@ def stop_attack(self):
self.logBox.clear()
self.status.showMessage('')
self.btn_stop.setEnabled(False)
self.btn_start_server.setEnabled(True)

def inter_get(self):
self.refresh_interface(self.cb_interface)
Expand Down Expand Up @@ -199,11 +200,11 @@ def server_start(self):
if len(self.path.text()) <= 0:
return QMessageBox.information(self, 'Path file Error', 'Error in get the file path.')
if self.rb_windows.isChecked():
return self.SettingsPage('templates/Update/Settings_WinUpdate.html',
'templates/Update/Windows_Update/','windows-update.exe',True)
return self.SettingsPage('templates/fakeupdate/Settings_WinUpdate.html',
'templates/fakeupdate/Windows_Update/','windows-update.exe',True)
elif self.rb_java.isChecked():
return self.SettingsPage('templates/Update/Settings_java.html',
'templates/Update/Java_Update/','java-update.exe',False)
return self.SettingsPage('templates/fakeupdate/Settings_java.html',
'templates/fakeupdate/Java_Update/','java-update.exe',False)

return QMessageBox.information(self, 'Phishing settings', 'Please select an option in the Phishing page:')

Expand Down
Binary file removed settings/source.tar.gz
Binary file not shown.
Binary file added templates/fakeupdate.tar.gz
Binary file not shown.
File renamed without changes.

0 comments on commit 144e219

Please sign in to comment.