Permalink
Browse files

Close issue #94: Fixing contact info. (#96)

* Close issue #94: Fixing contact info.

* Version uptick
  • Loading branch information...
htnhan authored and strictlymike committed Jan 24, 2019
1 parent 2aa6017 commit 906191ef9ff70a00c40590a8f809fb976d2d3020
Showing with 105 additions and 103 deletions.
  1. +7 −2 CHANGELOG.txt
  2. +1 −1 LICENSE.txt
  3. +68 −72 README.md
  4. +10 −10 fakenet/defaultFiles/FakeNet.html
  5. +4 −4 fakenet/defaultFiles/FakeNet.txt
  6. +10 −9 fakenet/fakenet.py
  7. +5 −5 setup.py
@@ -1,3 +1,8 @@
Version 1.4.2
-------------
* Updated contact information
* Whitespace wrangling

Version 1.4.1
-------------
* Syslog support
@@ -22,7 +27,7 @@ Version 1.3
* Protocol autodetection (thanks Matthew Haigh)
* Security: fix for path traversal vulnerability (thanks Cody Pierce and Antony Saba)
* Randomized banner generation (thanks Michael Bailey!)
* Listener: BITS protocol support
* Listener: BITS protocol support (thanks Peter Kacherginsky)
* Various bug fixes


@@ -46,4 +51,4 @@ Version 1.1
Version 1.0
-----------

* Initial release
* Initial Windows release by Peter Kacherginsky
@@ -175,7 +175,7 @@

END OF TERMS AND CONDITIONS

Copyright 2016 Peter Kacherginsky
Copyright (C) 2018 FireEye, Inc.

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
140 README.md

Large diffs are not rendered by default.

Oops, something went wrong.
@@ -5,33 +5,33 @@

<body>
<b><pre>
______ _ ________ _ _ ______ _______ _ _ _____
______ _ ________ _ _ ______ _______ _ _ _____
| ____/\ | |/ / ____| \ | | ____|__ __| | \ | |/ ____|
| |__ / \ | ' /| |__ | \| | |__ | |______| \| | | __
| |__ / \ | ' /| |__ | \| | |__ | |______| \| | | __
| __/ /\ \ | < | __| | . ` | __| | |______| . ` | | |_ |
| | / ____ \| . \| |____| |\ | |____ | | | |\ | |__| |
|_|/_/ \_\_|\_\______|_| \_|______| |_| |_| \_|\_____|

H T T P L I S T E N E R
H T T P L I S T E N E R
</pre></b>

<p>FakeNet-NG is a next generation dynamic network analysis tool for malware
analysts and penetration testers. It is open source and designed for the latest
analysts and penetration testers. It is open source and designed for the latest
versions of Windows.</p>

<p>The tool allows you to intercept and redirect all or specific network traffic
<p>The tool allows you to intercept and redirect all or specific network traffic
while simulating legitimate network services. Using FakeNet-NG, malware analysts
can quickly identify malware's functionality and capture network signatures.
Penetration testers and bug hunters will find FakeNet-NG's configurable
interception engine and modular framework highly useful when testing
can quickly identify malware's functionality and capture network signatures.
Penetration testers and bug hunters will find FakeNet-NG's configurable
interception engine and modular framework highly useful when testing
application's specific functionality and prototyping PoCs.</p>

<p>FakeNet-NG is based on the excellent Fakenet tool developed
by Andrew Honig and Michael Sikorski.</p>

<h3>Contact</h3>

For bugs, crashes, or other comments please contact <b>Peter Kacherginsky</b> by email
<b>peter.kacherginsky@fireeye.com</b> or Twitter <b>@_iphelix</b>.
For bugs, crashes, or other comments please contact <b>The FLARE Team</b> by email
<b>FakeNet@fireeye.com</b>.
</body>
</html>
@@ -1,11 +1,11 @@
______ _ ________ _ _ ______ _______ _ _ _____
______ _ ________ _ _ ______ _______ _ _ _____
| ____/\ | |/ / ____| \ | | ____|__ __| | \ | |/ ____|
| |__ / \ | ' /| |__ | \| | |__ | |______| \| | | __
| |__ / \ | ' /| |__ | \| | |__ | |______| \| | | __
| __/ /\ \ | < | __| | . ` | __| | |______| . ` | | |_ |
| | / ____ \| . \| |____| |\ | |____ | | | |\ | |__| |
|_|/_/ \_\_|\_\______|_| \_|______| |_| |_| \_|\_____|

H T T P L I S T E N E R
H T T P L I S T E N E R
FakeNet-NG is a next generation dynamic network analysis tool for malware analysts and penetration testers. It is open source and designed for the latest versions of Windows.

The tool allows you to intercept and redirect all or specific network traffic while simulating legitimate network services. Using FakeNet-NG, malware analysts can quickly identify malware's functionality and capture network signatures. Penetration testers and bug hunters will find FakeNet-NG's configurable interception engine and modular framework highly useful when testing application's specific functionality and prototyping PoCs.
@@ -14,4 +14,4 @@ FakeNet-NG is based on the excellent Fakenet tool developed by Andrew Honig and

Contact

For bugs, crashes, or other comments please contact Peter Kacherginsky by email peter.kacherginsky@fireeye.com or Twitter @_iphelix.
For bugs, crashes, or other comments please contact the FLARE Team by email FakeNet@fireeye.com
@@ -3,7 +3,8 @@
# FakeNet-NG is a next generation dynamic network analysis tool for malware
# analysts and penetration testers.
#
# Developed by Peter Kacherginsky
# Original developer: Peter Kacherginsky
# Current developer: FireEye FLARE Team (FakeNet@fireeye.com)

import logging
import logging.handlers
@@ -150,7 +151,7 @@ def start(self):

if self.diverter_config['networkmode'].lower() == 'auto':
self.diverter_config['networkmode'] = 'singlehost'

from diverters.windows import Diverter
self.diverter = Diverter(self.diverter_config, self.listeners_config, ip_addrs, self.logging_level)

@@ -206,14 +207,14 @@ def start(self):

for listener in self.running_listener_providers:

# Only listeners that implement acceptListeners(listeners)
# Only listeners that implement acceptListeners(listeners)
# interface receive running_listener_providers
try:
listener.acceptListeners(self.running_listener_providers)
except AttributeError:
self.logger.debug("acceptListeners() not implemented by Listener %s" % listener.name)

# Only listeners that implement acceptDiverter(diverter)
# Only listeners that implement acceptDiverter(diverter)
# interface receive diverter
try:
listener.acceptDiverter(self.diverter)
@@ -232,7 +233,7 @@ def stop(self):

def get_ips(ipvers):
"""Return IP addresses bound to local interfaces including loopbacks.
Parameters
----------
ipvers : list
@@ -266,17 +267,17 @@ def get_ips(ipvers):
def main():

print """
______ _ ________ _ _ ______ _______ _ _ _____
______ _ ________ _ _ ______ _______ _ _ _____
| ____/\ | |/ / ____| \ | | ____|__ __| | \ | |/ ____|
| |__ / \ | ' /| |__ | \| | |__ | |______| \| | | __
| |__ / \ | ' /| |__ | \| | |__ | |______| \| | | __
| __/ /\ \ | < | __| | . ` | __| | |______| . ` | | |_ |
| | / ____ \| . \| |____| |\ | |____ | | | |\ | |__| |
|_|/_/ \_\_|\_\______|_| \_|______| |_| |_| \_|\_____|
Version 1.4.1
Version 1.4.2
_____________________________________________________________
Developed by FLARE Team
_____________________________________________________________
_____________________________________________________________
"""

# Parse command line arguments
@@ -23,18 +23,18 @@

setup(
name='FakeNet NG',
version='1.3',
version='1.4.2',
description="",
long_description="",
author="Peter Kacherginsky",
author_email='peter.kacherginsky@fireeye.com',
author="FireEye FLARE Team with credit to Peter Kacherginsky as the original developer",
author_email='FakeNet@fireeye.com',
url='https://www.github.com/fireeye/flare-fakenet-ng',
packages=[
'fakenet',
],
package_dir={'fakenet': 'fakenet'},
package_data={'fakenet': ['*.pem','diverters/*.py', 'listeners/*.py',
'listeners/ssl_utils/*.py', 'listeners/ssl_utils/*.pem', 'configs/*.ini', 'defaultFiles/*',
package_data={'fakenet': ['*.pem','diverters/*.py', 'listeners/*.py',
'listeners/ssl_utils/*.py', 'listeners/ssl_utils/*.pem', 'configs/*.ini', 'defaultFiles/*',
'lib/64/*', 'lib/32/*']},
entry_points={
"console_scripts": [

0 comments on commit 906191e

Please sign in to comment.