Traffic Generator


SUBMITTED BY: Guest

DATE: March 3, 2014, 9:26 p.m.

FORMAT: Bash

SIZE: 33.1 kB

HITS: 2707

  1. #!/bin/bash
  2. # Ανάλογα το είδος ethernet μπορείτε να αλλάξτε το eth1 σε eth0
  3. # Χρησιμοποιούνται τα εργαλεία nemesis,sendip,mausezahn,yersinia,xdotool,hping,nping,idswakeup,stick,snot,rule2alert,sneeze, packeth,epb, scapy , metasploit, bittwist και pfsend
  4. # Δεν είναι αναγκαία η εγκατάσταση όλων των παραπάνω
  5. # Για κάθε εκτέλεση θα πρέπει να έχετε ενεργοποιημένα root privileges
  6. # Για τερματισμό λειτουργίας του προγράμματος πατήστε Ctrl+c συνεχόμενα
  7. # Ενδεχομένως να χρειαστεί να πατάτε Enter στην περίπτωση όπου εμφανίζεται εκτέλεση DOS επίθεσης από το yersinia για να σταματάτε κάθε φορά την επίθεση
  8. # Πιθανά πρωτόκολλα χρήσης από το nemesis
  9. rand[0]="udp"
  10. rand[1]="tcp"
  11. rand[2]="icmp"
  12. rand[3]="dns"
  13. rand[4]="ip"
  14. rand[5]="igmp"
  15. rand[6]="rip"
  16. rand[7]="ospf"
  17. rand[8]="arp"
  18. # Source hosts δικτύου Α
  19. IP[0]="10.0.0.50"
  20. IP[1]="10.0.0.60"
  21. IP[2]="10.0.0.70"
  22. IP[3]="10.0.0.80"
  23. IP[4]="10.0.0.90"
  24. # Source hosts δικτύου B
  25. IP[5]="12.0.0.10"
  26. IP[6]="12.0.0.20"
  27. IP[7]="12.0.0.30"
  28. IP[8]="12.0.0.40"
  29. # Source hosts δικτύου Γ
  30. IP[9]="18.0.0.1"
  31. IP[10]="18.0.0.2"
  32. IP[11]="18.0.0.3"
  33. IP[12]="18.0.0.4"
  34. IP[13]="18.0.0.5"
  35. IP[14]="18.0.0.6"
  36. IP[15]="18.0.0.7"
  37. # Source hosts δικτύου Δ
  38. IP[16]="24.0.0.1"
  39. IP[17]="24.0.0.2"
  40. IP[18]="24.0.0.3"
  41. IP[19]="24.0.0.4"
  42. IP[20]="24.0.0.5"
  43. # Source hosts δικτύου Ε
  44. IP[21]="30.0.0.6"
  45. IP[22]="30.0.0.7"
  46. IP[23]="30.0.0.8"
  47. IP[24]="30.0.0.9"
  48. IP[25]="30.0.0.10"
  49. IP[26]="30.0.0.11"
  50. IP[27]="30.0.0.12"
  51. IP[28]="30.0.0.13"
  52. # Destination hosts δικτύου A
  53. des[0]="10.0.0.10"
  54. des[1]="10.0.0.20"
  55. des[2]="10.0.0.30"
  56. des[3]="10.0.0.40"
  57. des[4]="10.0.0.50"
  58. # Destination hosts δικτύου B
  59. des[5]="12.0.0.50"
  60. des[6]="12.0.0.60"
  61. des[7]="12.0.0.70"
  62. des[8]="12.0.0.80"
  63. # Destination hosts δικτύου Γ
  64. des[9]="18.0.0.8"
  65. des[10]="18.0.0.9"
  66. des[11]="18.0.0.10"
  67. des[12]="18.0.0.11"
  68. des[13]="18.0.0.12"
  69. des[14]="18.0.0.13"
  70. des[15]="18.0.0.14"
  71. des[16]="18.0.0.15"
  72. des[17]="18.0.0.16"
  73. des[18]="18.0.0.17"
  74. des[19]="18.0.0.18"
  75. des[20]="18.0.0.19"
  76. # Destination hosts δικτύου Δ
  77. des[21]="24.0.0.6"
  78. des[22]="24.0.0.7"
  79. des[23]="24.0.0.8"
  80. des[24]="24.0.0.9"
  81. des[25]="24.0.0.10"
  82. # Destination hosts δικτύου Ε
  83. des[26]="30.0.0.1"
  84. des[27]="30.0.0.2"
  85. des[28]="30.0.0.3"
  86. des[29]="30.0.0.4"
  87. des[30]="30.0.0.5"
  88. # MAC addresses προς χρήση για όλα τα δίκτυα
  89. HEX[0]="22:22:22:22:22:22"
  90. HEX[1]="50:00:05:00:00:50"
  91. HEX[2]="44:44:44:44:44:44"
  92. HEX[3]="55:55:55:55:55:55"
  93. HEX[4]="00:00:00:00:00:00"
  94. HEXZ[0]="66:66:66:66:66:66"
  95. HEXZ[1]="77:77:77:77:77:77"
  96. HEXZ[2]="88:88:88:88:88:88"
  97. HEXZ[3]="11:11:11:11:11:11"
  98. HEXZ[4]="99:99:99:99:99:99"
  99. # Fragmentation options
  100. FCHOICE[0]="-FD"
  101. FCHOICE[1]="-FR"
  102. FCHOICE[2]="-FM"
  103. # TCP flags (SYN, ACK, RST, PSH, FIN, URG, ECN, CWR)
  104. TCP[0]="-fS"
  105. TCP[1]="-fA"
  106. TCP[2]="-fR"
  107. TCP[3]="-fP"
  108. TCP[4]="-fF"
  109. TCP[5]="-fU"
  110. TCP[6]="-fE"
  111. TCP[7]="-fC"
  112. # ICMP injection-mode (echo, address mask, unreachable, time exceeded, redirect, timestamp) για χρήση στο nemesis
  113. ICMP[0]="-qE"
  114. ICMP[1]="-qM"
  115. ICMP[2]="-qU"
  116. ICMP[3]="-qX"
  117. ICMP[4]="-qR"
  118. ICMP[5]="-qT"
  119. IGMP[0]="17"
  120. IGMP[1]="18"
  121. IGMP[2]="22"
  122. IGMP[3]="23"
  123. # TCP flags (SYN, ACK, RST, PSH, FIN, URG, ECN, CWR)
  124. FLAG[1]="fin"
  125. FLAG[2]="syn"
  126. FLAG[3]="rst"
  127. FLAG[4]="psh"
  128. FLAG[5]="ack"
  129. FLAG[6]="urg"
  130. FLAG[7]="ecn"
  131. FLAG[8]="cwr"
  132. # ICMP injection-mode (PING,REDIR,UNREACH)
  133. ICMPNAME[0]="PING"
  134. ICMPNAME[1]="REDIR"
  135. ICMPNAME[2]="UNREACH"
  136. # Fragmentation options
  137. IPFRAG[0]="df"
  138. IPFRAG[1]="mf"
  139. IPFRAG[2]="rf"
  140. # Σταθερή μεταβλητή για άπειρες επαναλήψεις
  141. z=-5
  142. # Εκκίνηση επανάληψης while
  143. while [ $z -lt 0 ];
  144. do
  145. # Μεταβλητή επαναλήψεων
  146. tool=$[$RANDOM % 25]
  147. # Χαρακτηριστικά πρωτοκόλλου DNS
  148. dnsi=$[$RANDOM]
  149. dnsg=$[$RANDOM]
  150. dnsq=$[$RANDOM]
  151. dnsw=$[$RANDOM]
  152. dnsA=$[$RANDOM]
  153. dnsr=$[$RANDOM]
  154. dnsb=$[$RANDOM]
  155. # Χαρακτηριστικά πρωτοκόλλου RIP
  156. ripa=$[$RANDOM % 65535]
  157. ripc=$[$RANDOM % 7]
  158. riph=$[$RANDOM % 1]
  159. ripk=$[$RANDOM % 1]
  160. ripm=$[$RANDOM % 16]
  161. ripr=$[$RANDOM % 1]
  162. ripR=$[$RANDOM % 2]
  163. ripV=$[$RANDOM % 2]
  164. # Τυχαίες διευθύνσεις MAC
  165. HEX0=$[$RANDOM % 77]
  166. HEX1=$[$RANDOM % 77]
  167. HEX2=$[$RANDOM % 77]
  168. HEX3=$[$RANDOM % 77]
  169. HEX4=$[$RANDOM % 77]
  170. HEX5=$[$RANDOM % 77]
  171. hexrand=$[$RANDOM % 4]
  172. # Θύρες πηγής και προορισμού
  173. SPORT=$[$RANDOM % 65535]
  174. DPORT=$[$RANDOM % 65535]
  175. # Δευτερεύοντα χαρακτηριστικά πακέτων (time to live κ.α)
  176. wdata=$[$RANDOM]
  177. sdata=$[$RANDOM]
  178. adata=$[$RANDOM]
  179. udata=$[$RANDOM]
  180. Idata=$[$RANDOM]
  181. Tdata=$[$RANDOM % 254]
  182. tdata=$[$RANDOM % 254]
  183. Idata=$[$RANDOM]
  184. randx=$[$RANDOM % 7]
  185. # Διευθύνσεις IP πηγής και τελικού προορισμού
  186. IPx=$[$RANDOM % 28]
  187. desx=$[$RANDOM % 30]
  188. # Δείκτες τυχαιότητας
  189. FRAND=$[$RANDOM % 3]
  190. TCPRAND=$[$RANDOM % 8]
  191. # Τυχαιότητα στα πρωτόκολλα ICMP και IGMP
  192. icmpc=$[$RANDOM % 255]
  193. icmpi=$[$RANDOM % 255]
  194. ICMPRAND=$[$RANDOM % 6]
  195. IGMPRAND=$[$RANDOM % 4]
  196. IPRAND=$[$RANDOM % 100]
  197. IGMPCODE=$[$RANDOM % 100]
  198. # Χαρακτηριστικά IPv4 πρωτοκόλλου
  199. ipv4len=$[$RANDOM]
  200. ipv4data=$[$RANDOM]
  201. ipv4offset=$[$RANDOM]
  202. # Χαρακτηριστικά TCP πρωτοκόλλου
  203. tcpseq=$[$RANDOM]
  204. tcpack=$[$RANDOM]
  205. tcpoff=$[$RANDOM]
  206. tcphead=$[$RANDOM]
  207. tcpwindow=$[$RANDOM]
  208. tcpcheck=$[$RANDOM]
  209. tcpurgpoint=$[$RANDOM]
  210. # Χαρακτηριστικά BGP πρωτοκόλλου
  211. bgplen=$[$RANDOM]
  212. bgptype=$[$RANDOM % 4]
  213. bgpversion=$[$RANDOM]
  214. bgpas=$[$RANDOM]
  215. bgptime=$[$RANDOM]
  216. bgpid=$[$RANDOM]
  217. bgpoptlen=$[$RANDOM]
  218. # Χαρακτηριστικά UDP πρωτοκόλλου
  219. udpsource=$[$RANDOM]
  220. udpdest=$[$RANDOM]
  221. udplen=$[$RANDOM]
  222. udpchecks=$[$RANDOM]
  223. # Χαρακτηριστικά NTP πρωτοκόλλου
  224. ntpleap=$[$RANDOM]
  225. ntpstat=$[$RANDOM]
  226. ntptype=$[$RANDOM]
  227. ntppre=$[$RANDOM]
  228. ntperror=$[$RANDOM]
  229. ntpdrift=$[$RANDOM]
  230. ntpid=$[$RANDOM]
  231. ntptime=$[$RANDOM]
  232. ntptimeb=$[$RANDOM]
  233. ntptimec=$[$RANDOM]
  234. ntptimed=$[$RANDOM]
  235. # Είδος και έλεγχος ICMP πρωτοκόλλου
  236. icmptype=$[$RANDOM]
  237. icmpcode=$[$RANDOM]
  238. icmpcheck=$[$RANDOM]
  239. # Χαρακτηριστικά RIP πρωτοκόλλου
  240. ripfamily=$[$RANDOM]
  241. riptag=$[$RANDOM]
  242. ripsub1=$[$RANDOM % 255]
  243. ripsub2=$[$RANDOM % 255]
  244. ripsub3=$[$RANDOM % 255]
  245. ripsub4=$[$RANDOM % 255]
  246. riphop=$[$RANDOM]
  247. ripmetric=$[$RANDOM]
  248. # IP διευθύνσεις για το DNS πρωτόκολλο
  249. dnsip1=$[$RANDOM % 255]
  250. dnsip2=$[$RANDOM % 255]
  251. dnsip3=$[$RANDOM % 255]
  252. dnsip4=$[$RANDOM % 255]
  253. # Δείκτης τυχαιότητας flag και χαρακτηριστικά TCP πρωτοκόλλου για το mausezhan
  254. FLAGRAND=$[$RANDOM]
  255. MZTCPS=$[$RANDOM % 4294967295]
  256. MZTCPA=$[$RANDOM % 4294967295]
  257. MZTCPWIN=$[$RANDOM % 65535]
  258. MZTCPURG=$[$RANDOM % 65535]
  259. MZTCPSUM=$[$RANDOM % 255]
  260. MZTCPPAYLOAD=$[$RANDOM % 24124968236035435678340691525178281724124909263597265902359026235762309592]
  261. # UDP χαρακτηριστικά (length,summary,payload)
  262. MZUDPLEN=$[$RANDOM % 65535]
  263. MZUDPSUM=$[$RANDOM % 255]
  264. MZUDPPAYLOAD=$[$RANDOM % 96346823512737845895637342561357965956985692352358458899569563463633452355]
  265. # Χαρακτηριστικά ICMP πρωτοκόλλου για το mausezhan
  266. ICMPNAMERAND=$[$RANDOM % 3]
  267. MZICMPCODE=$[$RANDOM % 6]
  268. MZICMPID=$[$RANDOM % 65535]
  269. MZICMPSEQ=$[$RANDOM % 65535]
  270. # Δικτυακές πύλες ICMP
  271. MZICMPGATEWAY1=$[$RANDOM % 255]
  272. MZICMPGATEWAY2=$[$RANDOM % 255]
  273. MZICMPGATEWAY3=$[$RANDOM % 255]
  274. MZICMPGATEWAY4=$[$RANDOM % 255]
  275. # Πληροφορίες IP πακέτου για το mausezhan
  276. MZIPLEN=$[$RANDOM % 65535]
  277. MZIPSUM=$[$RANDOM % 255]
  278. MZIPTOS=$[$RANDOM % 65535]
  279. MZIPTOS=$[$RANDOM]
  280. MZIPDSCP=$[$RANDOM % 63]
  281. MZIPTTL=$[$RANDOM % 255]
  282. MZIPPROTO=$[$RANDOM % 100]
  283. MZIPRAND=$[$RANDOM]
  284. MZIPID=$[$RANDOM % 65535]
  285. # Υπογραφή TCP
  286. tcpsign=$[$RANDOM]
  287. # Χαρακτηριστικά STP πακέτου
  288. stpattack=$[$RANDOM % 7]
  289. stpversion=$[$RANDOM % 3]
  290. stpflags=$[$RANDOM % 50]
  291. stpid=$[$RANDOM % 50]
  292. stpcost=$[$RANDOM % 50]
  293. stpportid=$[$RANDOM % 50]
  294. stpmessage=$[$RANDOM % 50]
  295. stpmax=$[$RANDOM % 50]
  296. stphello=$[$RANDOM % 50]
  297. stpforward=$[$RANDOM % 50]
  298. stpsource=$[$RANDOM % 16]
  299. stpdest=$[$RANDOM % 16]
  300. stptype=$[$RANDOM % 50]
  301. # Χαρακτηριστικά CDP πακέτου
  302. cdpattack=$[$RANDOM % 2]
  303. cdpversion=$[$RANDOM % 3]
  304. cdpttl=$[$RANDOM % 50]
  305. cdpsource=$[$RANDOM % 16]
  306. cdpdest=$[$RANDOM % 16]
  307. # HSRP attack vector
  308. hsrpattack=$[$RANDOM % 2]
  309. # DHCP attack vector
  310. dhcpattack=$[$RANDOM % 3]
  311. # DTP attack vector
  312. dtpattack=$[$RANDOM % 1]
  313. # 802.1 attack vector
  314. qattack=$[$RANDOM % 2]
  315. # VTP attack vector
  316. vtpattack=$[$RANDOM % 4]
  317. if [ "$tool" = 0 ] ;
  318. then
  319. if [ "$randx" = 1 ] ;
  320. then
  321. nemesis "${rand[$randx]}" -v -x $SPORT -y $DPORT $TCPRAND -w $wdata -s $sdata -a $adata -u $udata -S "${IP[$IPx]}" -D "${des[$desx]}" -I $Idata -T $Tdata -t $tdata "${FCHOICE[$FRAND]}" -M '%x:' $HEX0 $HEX1 $HEX2 $HEX3 $HEX4 $HEX5
  322. elif [ "$randx" = 0 ] ;
  323. then
  324. nemesis udp -v -x $SPORT -y $DPORT -S "${IP[$IPx]}" -D "${des[$desx]}" -I $Idata -T $Tdata -t $tdata "${FCHOICE[$FRAND]}" -M '%x:' $HEX0 $HEX1 $HEX2 $HEX3 $HEX4 $HEX5
  325. elif [ "$randx" = 2 ] ;
  326. then
  327. nemesis icmp -v "${ICMP[$ICMPRAND]}" -S "${IP[$IPx]}" -D "${des[$desx]}" -I $Idata -T $Tdata -t $tdata "${FCHOICE[$FRAND]}" -M '%x:' $HEX0 $HEX1 $HEX2 $HEX3 $HEX4 $HEX5
  328. elif [ "$randx" = 7 ] ;
  329. then
  330. nemesis rip -v -a $ripa -c $ripc -h $riph -i "${des[$desx]}" -k $ripk -m $ripm -r $ripr -R $ripR -V $ripV -S "${IP[$IPx]}" -D "${des[$desx]}" -I $Idata -T $Tdata -t $tdata "${FCHOICE[$FRAND]}" -M '%x:' $HEX0 $HEX1 $HEX2 $HEX3 $HEX4 $HEX5
  331. elif [ "$randx" = 8 ] ;
  332. then
  333. nemesis ospf -v -x $SPORT -y $DPORT -S "${IP[$IPx]}" -D "${des[$desx]}" -I $Idata -T $Tdata -t $tdata "${FCHOICE[$FRAND]}" -M '%x:' $HEX0 $HEX1 $HEX2 $HEX3 $HEX4 $HEX5
  334. elif [ "$randx" = 9 ] ;
  335. then
  336. nemesis arp -v -x $SPORT -y $DPORT -S "${IP[$IPx]}" -D "${des[$desx]}" -I $Idata -T $Tdata -t $tdata "${FCHOICE[$FRAND]}" -M '%x:' $HEX0 $HEX1 $HEX2 $HEX3 $HEX4 $HEX5
  337. elif [ "$randx" = 4 ] ;
  338. then
  339. nemesis ip -v -D "${des[$desx]}" -I $Idata -p $IPRAND -T $Tdata -t $tdata "${FCHOICE[$FRAND]}" -S "${IP[$IPx]}" -M '%x:' $HEX0 $HEX1 $HEX2 $HEX3 $HEX4 $HEX5
  340. elif [ "$randx" = 5 ] ;
  341. then
  342. nemesis igmp -v -c $IGMPCODE -i "${des[$desx]}" -p $IGMPRAND -D "${des[$desx]}" "${FCHOICE[$FRAND]}" -I $Idata -S "${IP[$IPx]}" -t $tdata -T $Tdata -M '%x:' $HEX0 $HEX1 $HEX2 $HEX3 $HEX4 $HEX5
  343. elif [ "$randx" = 3 ] ;
  344. then
  345. nemesis dns -v -i $dnsi -b $dnsb -g $dnsg -q $dnsq -w $dnsw -A $dnsA -r $dnsr -S "${IP[$IPx]}" -D "${des[$desx]}"
  346. else
  347. nemesis "${rand[$randx]}" -v -S "${IP[$IPx]}" -D "${des[$desx]}" -I $Idata -T $Tdata -t $tdata "${FCHOICE[$FRAND]}" -M '%x:' $HEX0 $HEX1 $HEX2 $HEX3 $HEX4 $HEX5
  348. fi
  349. fi
  350. if [ "$tool" = 1 ] ;
  351. then
  352. sendip -v "${des[$desx]}" -p ipv4 -is "${IP[$IPx]}" -id "${des[$desx]}" -ih 21 -iv 4 -iy 0 -il $ipv4len -ii $ipv4data -ifr $ipv4offset -it $tdata -ip $IPRAND
  353. fi
  354. if [ "$tool" = 2 ] ;
  355. then
  356. sendip -v "${des[$desx]}" -p ipv4 -is "${IP[$IPx]}" -id "${des[$desx]}" -ih 21 -iv 4 -iy 0 -il $ipv4len -ii $ipv4data -ifr $ipv4offset -it $tdata -p tcp -ts $SPORT -td $DPORT -tn $tcpseq -ta $tcpack -tt $tcpoff -tr $tcphead -tfe r -tfc r -tfu r -tfa r -tfp r -tfr r -tfs r -tff r -tw $tcpwindow -tc $tcpcheck -tu $tcpurgpoint
  357. fi
  358. if [ "$tool" = 3 ] ;
  359. then
  360. sendip -v "${des[$desx]}" -p ipv4 -is "${IP[$IPx]}" -id "${des[$desx]}" -ih 21 -iv 4 -iy 0 -il $ipv4len -ii $ipv4data -ifr $ipv4offset -it $tdata -p tcp -ts $SPORT -td 179 -tn $tcpseq -ta $tcpack -tt $tcpoff -tr $tcphead -tfe r -tfc r -tfu r -tfa r -tfp r -tfr r -tfs r -tff r -tw $tcpwindow -tc $tcpcheck -tu $tcpurgpoint -p bgp -bm $HEX0":"$HEX1":"$HEX2":"$HEX":"$HEX4":"$HEX5 -bl $bgplen -bt $bgptype -bo $bgpversion":"$bgpas":"$bgptime":"$bgpid":"$bgpoptlen
  361. fi
  362. if [ "$tool" = 4 ] ;
  363. then
  364. sendip -v "${des[$desx]}" -p ipv4 -is "${IP[$IPx]}" -id "${des[$desx]}" -ih 21 -iv 4 -iy 0 -il $ipv4len -ii $ipv4data -ifr $ipv4offset -it $tdata -p udp -us $udpsource -ud $udpdest -ul $udplen -uc $udpchecks
  365. fi
  366. if [ "$tool" = 5 ] ;
  367. then
  368. sendip -v "${des[$desx]}" -p ipv4 -is "${IP[$IPx]}" -id "${des[$desx]}" -ih 21 -iv 4 -iy 0 -il $ipv4len -ii $ipv4data -ifr $ipv4offset -it $tdata -p udp -us $udpsource -ud 53 -ul $udplen -uc $udpchecks -p ntp -nl $ntpleap -ns $ntpstat -nt $ntptype -np $ntppre -ne $ntperror -nd $ntpdrift -nr $ntpid -nf $ntptime -no $ntptimeb -na $ntptimec -nx $ntptimed
  369. fi
  370. if [ "$tool" = 6 ] ;
  371. then
  372. sendip -v "${des[$desx]}" -p ipv4 -is "${IP[$IPx]}" -id "${des[$desx]}" -ih 21 -iv 4 -iy 0 -il $ipv4len -ii $ipv4data -ifr $ipv4offset -it $tdata -p udp -us $udpsource -ud 123 -ul $udplen -uc $udpchecks -p ntp -nl $ntpleap -ns $ntpstat -nt $ntptype -np $ntppre -ne $ntperror -nd $ntpdrift -nr $ntpid -nf $ntptime -no $ntptimeb -na $ntptimec -nx $ntptimed
  373. fi
  374. if [ "$tool" = 7 ] ;
  375. then
  376. sendip -v "${des[$desx]}" -p ipv4 -is "${IP[$IPx]}" -id "${des[$desx]}" -ih 21 -iv 4 -iy 0 -il $ipv4len -ii $ipv4data -ifr $ipv4offset -it $tdata -p icmp -ct $icmptype -cd $icmpcode -cc $icmpcheck
  377. fi
  378. if [ "$tool" = 8 ] ;
  379. then
  380. sendip -v "${des[$desx]}" -p ipv4 -is "${IP[$IPx]}" -id "${des[$desx]}" -ih 21 -iv 4 -iy 0 -il $ipv4len -ii $ipv4data -ifr $ipv4offset -it $tdata -p udp -us $udpsource -ud 520 -ul $udplen -uc $udpchecks -p rip -rv $ripV -rc $ripc -re $ripfamily":"$riptag":""${des[$desx]}"":"$ripsub1":"$ripsub2":"$ripsub3":"$ripsub4":"$ripmetric
  381. fi
  382. if [ "$tool" = 9 ] ;
  383. then
  384. sendip -v "${des[$desx]}" -p ipv4 -is "${IP[$IPx]}" -id "${des[$desx]}" -ih 21 -iv 4 -iy 0 -il $ipv4len -ii $ipv4data -ifr $ipv4offset -it $tdata -p udp -us $udpsource -ud 520 -ul $udplen -uc $udpchecks -p ripng -Rv $ripV -Rc $ripc -Rr 0 -Re $ripfamily":"$riptag":""${des[$desx]}"":"$ripsub1":"$ripsub2":"$ripsub3":"$ripsub4":"$ripmetric
  385. fi
  386. if [ "$tool" = 10 ] ;
  387. then
  388. mz eth1 -B mydns-server.com -t dns "q=www.ds.unipi.gr, a=$dnsip1.$dnsip2.$dnsip3.$dnsip4" -A "${IP[$IPx]}" -B "${des[$desx]}"
  389. fi
  390. if [ "$tool" = 11 ] ;
  391. then
  392. mz eth1 -A "${IP[$IPx]}" -B "${des[$desx]}" -t tcp "sp=$SPORT, dp=$DPORT, flags="${FLAG[$FLAGRAND]}", s=$MZTCPS , a=$MZTCPA , win=$MZTCPWIN , urg=$MZTCPURG , sum=$MZTCPSUM" -P $MZTCPPAYLOAD
  393. fi
  394. if [ "$tool" = 12 ] ;
  395. then
  396. mz eth1 -A "${IP[$IPx]}" -B "${des[$desx]}" -t tcp "sp=80, dp=80, flags="${FLAG[$FLAGRAND]}", s=$MZTCPS , a=$MZTCPA , win=$MZTCPWIN , urg=$MZTCPURG , sum=$MZTCPSUM" -P $MZTCPPAYLOAD
  397. fi
  398. if [ "$tool" = 13 ] ;
  399. then
  400. mz eth1 -A "${IP[$IPx]}" -B "${des[$desx]}" -t udp "sp=$SPORT, dp=$DPORT, len=$MZUDPLEN , sum=$MZUDPSUM" -P $MZUDPPAYLOAD
  401. fi
  402. if [ "$tool" = 14 ] ;
  403. then
  404. mz eth1 -t icmp ""${ICMPNAME[$ICMPNAMERAND]}",code=$MZICMPCODE, gw=$MZICMPGATEWAY1"."$MZICMPGATEWAY2"."$MZICMPGATEWAY3"."$MZICMPGATEWAY4 , id=$MZICMPID, seq=$MZICMPSEQ" -A "${IP[$IPx]}" -B "${des[$desx]}"
  405. fi
  406. if [ "$tool" = 15 ] ;
  407. then
  408. mz eth1 -t ip -c 1 -A "${IP[$IPx]}" -B "${des[$desx]}" "len=$MZIPLEN,sum=$MZIPSUM,tos=$MZIPTOS,dscp=$MZIPDSCP,ttl=$MZIPTTL,proto=$MZIPPROTO,"${IPFRAG[$MZIPFRAG]}",id=$MZIPID"
  409. fi
  410. if [ "$tool" = 16 ] ;
  411. then
  412. yersinia stp -attack 0 -version $stpversion -flags $stpflags -id $stpid -cost $stpcost -portid $stpportid -message $stpmessage -max-age $stpmax -hello $stphello -forward $stpforward -source "${HEX[$hexrand]}" -dest "${HEXZ[$hexrand]}" -interface eth1 -type $stptype
  413. fi
  414. if [ "$tool" = 17 ] ;
  415. then
  416. yersinia cdp -attack 0 -source "${HEX[$hexrand]}" -dest "${HEXZ[$hexrand]}" -ttl $cdpttl -version $cdpversion
  417. xdotool key a
  418. fi
  419. if [ "$tool" = 18 ] ;
  420. then
  421. yersinia hsrp -attack 0 -source "${HEX[$hexrand]}" -dest "${HEXZ[$hexrand]}"
  422. xdotool key c
  423. fi
  424. if [ "$tool" = 19 ] ;
  425. then
  426. yersinia dhcp -attack 0 -source "${HEX[$hexrand]}" -dest "${HEXZ[$hexrand]}"
  427. xdotool key d
  428. fi
  429. if [ "$tool" = 20 ] ;
  430. then
  431. yersinia dtp -attack 0 -source "${HEX[$hexrand]}" -dest "${HEXZ[$hexrand]}"
  432. xdotool key e
  433. fi
  434. if [ "$tool" = 21 ] ;
  435. then
  436. if [ "$randx" = 0 ] ;
  437. then
  438. yersinia vtp -attack 0 -source "${HEX[$hexrand]}" -dest "${HEXZ[$hexrand]}"
  439. xdotool key g
  440. elif [ "$randx" = 1 ] ;
  441. then
  442. yersinia vtp -attack 2 -source "${HEX[$hexrand]}" -dest "${HEXZ[$hexrand]}"
  443. xdotool key f
  444. elif [ "$randx" = 2 ] ;
  445. then
  446. yersinia vtp -attack 3 -source "${HEX[$hexrand]}" -dest "${HEXZ[$hexrand]}"
  447. xdotool key h
  448. fi
  449. fi
  450. if [ "$tool" = 22 ] ;
  451. then
  452. yersinia dot1q -attack $qattack -source "${HEX[$hexrand]}" -dest "${HEXZ[$hexrand]}"
  453. xdotool key u
  454. fi
  455. if [ "$tool" = 23 ] ;
  456. then
  457. yersinia dot1x -attack $qattack -source "${HEX[$hexrand]}" -dest "${HEXZ[$hexrand]}"
  458. xdotool key o
  459. fi
  460. # Attributes που φέρει ο HPING generator
  461. loops=$[$RANDOM % 3]
  462. hpingsport=$[$RANDOM % 65535]
  463. hpingdport=$[$RANDOM % 65535]
  464. type=$[$RANDOM % 2]
  465. hpingw=$[$RANDOM]
  466. hpingo=$[$RANDOM]
  467. hpingm=$[$RANDOM]
  468. hpingl=$[$RANDOM]
  469. hpinge=$[$RANDOM]
  470. hpingt=$[$RANDOM]
  471. hpingn=$[$RANDOM]
  472. hpingh=$[$RANDOM]
  473. hpingg=$[$RANDOM]
  474. hpingmip=$[$RANDOM]
  475. hpingeoip=$[$RANDOM]
  476. hpingc=$[$RANDOM % 41]
  477. hpingk=$[$RANDOM]
  478. hpingver=$[$RANDOM]
  479. hpinglen=$[$RANDOM]
  480. hpingid=$[$RANDOM]
  481. hpingproto=$[$RANDOM % 100]
  482. hpingcheck=$[$RANDOM]
  483. # Νέος αριθμός επαναλήψεων
  484. p=$[$RANDOM % 20]
  485. # Διευθύνσεις IP πηγής και προορισμού
  486. IPx2=$[$RANDOM % 16]
  487. desx2=$[$RANDOM % 20]
  488. # Attributes που φέρει ο NPING generator
  489. npingflag=$[$RANDOM % 8]
  490. npingack=$[$RANDOM]
  491. npingwin=$[$RANDOM]
  492. npingseq=$[$RANDOM]
  493. npingsport=$[$RANDOM % 65535]
  494. npingdport=$[$RANDOM % 65535]
  495. npingttl=$[$RANDOM]
  496. npingid=$[$RANDOM]
  497. npingdatalen=$[$RANDOM]
  498. npingdatastring=$[$RANDOM]
  499. npingdata=$[$RANDOM]
  500. npingdelay=$[$RANDOM]
  501. npingrate=$[$RANDOM]
  502. npingtos=$[$RANDOM]
  503. # Τυχαίες MAC διευθύνσεις πηγής και προορισμού
  504. HEX6=$[$RANDOM % 77]
  505. HEX7=$[$RANDOM % 77]
  506. HEX8=$[$RANDOM % 77]
  507. HEX9=$[$RANDOM % 77]
  508. HEX10=$[$RANDOM % 77]
  509. HEX11=$[$RANDOM % 77]
  510. HEX12=$[$RANDOM % 77]
  511. HEX13=$[$RANDOM % 77]
  512. HEX14=$[$RANDOM % 77]
  513. HEX15=$[$RANDOM % 77]
  514. HEX16=$[$RANDOM % 77]
  515. HEX17=$[$RANDOM % 77]
  516. # Χαρακτηριστικά ICMP πακέτου για το NPING
  517. npingicmptype=$[$RANDOM % 20]
  518. npingicmpseq=$[$RANDOM]
  519. npingicmprecv=$[$RANDOM]
  520. npingicmptrans=$[$RANDOM]
  521. npingicmportime=$[$RANDOM]
  522. npingicmpparam=$[$RANDOM]
  523. npingicmpadvert=$[$RANDOM]
  524. npingicmpprefix=$[$RANDOM % 64]
  525. npingip1=$[$RANDOM % 255]
  526. npingip2=$[$RANDOM % 255]
  527. npingip3=$[$RANDOM % 255]
  528. npingip4=$[$RANDOM % 255]
  529. if [ "$p" = 1 ] ; then
  530. hping2 "${des[$desx2]}" -a "${IP[$IPx2]}" -s 80 -d 80 -c $loops -k -w $hpingw -O $hpingo -b -M $hpingm -L $hpingl -F -S -R -P -A -U -X -Y -S -u -e $hpinge
  531. fi
  532. if [ "$p" = 2 ] ;
  533. then
  534. hping2 "${des[$desx2]}" -a "${IP[$IPx2]}" -c $loops -k -w $hpingw -O $hpingo -M $hpingm -L $hpingl -A -U -X -Y -S -u -e $hpinge
  535. fi
  536. if [ "$p" = 3 ] ;
  537. then
  538. hping2 "${des[$desx2]}" -a "${IP[$IPx2]}" -s 53 -d 53 -c $loops -k -w $hpingw -O $hpingo -b -M $hpingm -L $hpingl -F -S -X -Y -S -u -e $hpinge
  539. fi
  540. if [ "$p" = 4 ] ; then
  541. hping2 -$type "${des[$desx2]}" -a "${IP[$IPx]}" -s 73 -d 73 -c $loops -k -w $hpingw -O $hpingo -b -M $hpingm -L $hpingl -S -R -A -X -Y -S -u -e $hpinge
  542. fi
  543. if [ "$p" = 5 ] ; then
  544. hping2 "${des[$desx2]}" -a "${IP[$IPx2]}" -s 53 -d 53 -c $loops -k -w $hpingw -O $hpingo -b -M $hpingm -L $hpingl -S -A -U -S -u -e $hpinge
  545. fi
  546. if [ "$p" = 6 ] ; then
  547. hping2 "${des[$desx2]}" -a "${IP[$IPx2]}" -s 7 -d 7 -c $loops -k -w $hpingw -O $hpingo -M $hpingm -L $hpingl -P -A -U -X -Y -S -u -e $hpinge
  548. fi
  549. if [ "$p" = 7 ] ; then
  550. hping2 -1 -c $loops "${des[$desx2]}" -a "${IP[$IPx2]}" -K $hpingk --icmp-ipver $hpingver --icmp-iphlen $hpinglen --icmp-iplen $hpinglen --icmp-ipid $hpingid --icmp-ipproto $hpingproto --icmp-cksum $hpingcheck
  551. fi
  552. if [ "$p" = 8 ] ; then
  553. hping2 "${des[$desx2]}" -a "${IP[$IPx2]}" -s 23 -d 23 -c $loops -k -w $hpingw -O $hpingo -b -M $hpingm -L $hpingl -R -P -X -Y -S -u -e $hpinge
  554. fi
  555. if [ "$p" = 9 ] ; then
  556. hping2 -$type "${des[$desx2]}" -a "${IP[$IPx2]}" -s 28 -d 28 -c $loops -k -w $hpingw -O $hpingo -b -M $hpingm -L $hpingl -F -A -U -X -Y -S -u -e $hpinge
  557. fi
  558. if [ "$p" = 10 ] ; then
  559. hping2 "${des[$desx2]}" -0 -a "${IP[$IPx2]}" -c $loops -t $hpingt -N $hpingn -H $hpingh -r -f -x -g $hpingg -m $hpingmip -o $hpingeoip -G
  560. fi
  561. if [ "$p" = 11 ] ; then
  562. hping2 -1 -c $loops "${des[$desx2]}" -a "${IP[$IPx2]}" -K $hpingk
  563. fi
  564. if [ "$p" = 12 ] ; then
  565. hping2 -1 -c $loops "${des[$desx2]}" -a "${IP[$IPx2]}" -K $hpingk --icmp-ipver $hpingver --icmp-iphlen $hpinglen --icmp-iplen $hpinglen --icmp-ipid $hpingid --icmp-ipproto $hpingproto --icmp-cksum $hpingcheck --icmp-ts --icmp-addr -C $hpingc
  566. fi
  567. if [ "$p" = 13 ] ; then
  568. hping2 -2 "${des[$desx2]}" -a "${IP[$IPx2]}" -s 179 -d 179 -c $loops -k -w $hpingw -O $hpingo -M $hpingm -L $hpingl -A -U -X -Y -S -u -e $hpinge
  569. fi
  570. if [ "$p" = 14 ] ; then
  571. hping2 -2 "${des[$desx2]}" -a "${IP[$IPx2]}" -s 179 -d 179 -c $loops -k -w $hpingw -O $hpingo -M $hpingm -L $hpingl -A -U -X -Y -S -u -e $hpinge
  572. fi
  573. if [ "$p" = 15 ] ; then
  574. nping --tcp -p $npingdport -g $npingsport -c 1 --flags "${FLAG[$npingflag]}" --seq $npingseq --win $npingwin --badsum --ack $npingack --ttl 2 --id 23 --df --dest-ip "${des[$desx2]}" --source-ip "${IP[$IPx2]}" --dest-mac $HEX6":"$HEX7":"$HEX8":"$HEX9":"$HEX10":"$HEX11 --source-mac $HEX11":"$HEX12":"$HEX13":"$HEX14":"$HEX15":"$HEX16 --data-length $npingdatalen --data-string $npingdatastring --data $npingdata --tos $npingtos
  575. fi
  576. if [ "$p" = 16 ] ; then
  577. nping --tcp -p $npingdport -g $npingsport -c 1 --flags "${FLAG[$npingflag]}" --seq $npingseq --win $npingwin --ack $npingack --ttl $npingttl --id $npingid --mf --dest-ip "${des[$desx2]}" --source-ip "${IP[$IPx2]}" --dest-mac $HEX6":"$HEX7":"$HEX8":"$HEX9":"$HEX10":"$HEX11 --source-mac $HEX11":"$HEX12":"$HEX13":"$HEX14":"$HEX15":"$HEX16 --data-length $npingdatalen --data-string $npingdatastring --data $npingdata --delay $npingdelay"ms" --rate $npingrate --tos $npingtos
  578. fi
  579. if [ "$p" = 17 ] ; then
  580. nping --tcp-connect -p $npingdport -g $npingsport -c 1 --flags "${FLAG[$npingflag]}" --seq $npingseq --win $npingwin --ack $npingack --ttl $npingttl --id $npingid --mf --dest-ip "${des[$desx2]}" --source-ip "${IP[$IPx2]}" --dest-mac $HEX6":"$HEX7":"$HEX8":"$HEX9":"$HEX10":"$HEX11 --source-mac $HEX11":"$HEX12":"$HEX13":"$HEX14":"$HEX15":"$HEX16 --data-length $npingdatalen --data-string $npingdatastring --data $npingdata --delay $npingdelay"ms" --tos $npingtos
  581. fi
  582. if [ "$p" = 18 ] ; then
  583. nping --udp -p $npingdport -g $npingsport -c 1 --ttl $npingttl --id $npingid --df --badsum --dest-ip "${des[$desx2]}" --source-ip "${IP[$IPx2]}" --dest-mac $HEX6":"$HEX7":"$HEX8":"$HEX9":"$HEX10":"$HEX11 --source-mac $HEX11":"$HEX12":"$HEX13":"$HEX14":"$HEX15":"$HEX16 --data-length $npingdatalen --data-string $npingdatastring --data $npingdata --delay $npingdelay"ms" --tos $npingtos
  584. fi
  585. if [ "$p" = 19 ] ; then
  586. nping --udp -p $npingdport -g $npingsport -c 1 --ttl $npingttl --id $npingid --dest-ip "${des[$desx2]}" --source-ip "${IP[$IPx2]}" --dest-mac $HEX6":"$HEX7":"$HEX8":"$HEX9":"$HEX10":"$HEX11 --source-mac $HEX11":"$HEX12":"$HEX13":"$HEX14":"$HEX15":"$HEX16 --data-length $npingdatalen --data-string $npingdatastring --data $npingdata --delay $npingdelay"ms" --rate $npingrate --tos $npingtos
  587. fi
  588. if [ "$p" = 20 ] ; then
  589. nping --icmp -c 1 --ttl $npingttl --id $npingid --icmp-type $npingicmptype --delay $npingdelay"ms" -dest-ip "${des[$desx2]}" --icmp-id 34 -source-ip "${IP[$IPx2]}" --icmp-seq $npingicmpseq --icmp-redirect-addr $npingip1"."$npingip2"."$npingip3"."$npingip4 --icmp-param-pointer $npingicmpparam --icmp-advert-lifetime $npingicmpadvert --icmp-advert-entry $npingip1"."$npingip2"."$npingip3"."$npingip4","$npingicmpprefix --icmp-orig-time $npingicmportime --icmp-recv-time $npingicmprecv --icmp-trans-time $npingicmptrans
  590. fi
  591. # Επιλογές που αφορούν το NIDS signature testing
  592. wakeupnum=$[$RANDOM]
  593. wakeupttl=$[$RANDOM]
  594. sneezecounter=$[$RANDOM]
  595. sneezeport=$[$RANDOM % 65535]
  596. snotdelay=$[$RANDOM]
  597. snotnum=$[$RANDOM]
  598. sticksc=$[$RANDOM % 255]
  599. sticksc2=$[$RANDOM % 255]
  600. sticksc3=$[$RANDOM % 255]
  601. sticksr=$[$RANDOM % 255]
  602. sticksr2=$[$RANDOM % 255]
  603. sticksr3=$[$RANDOM % 255]
  604. sticksr4=$[$RANDOM % 255]
  605. stickdr=$[$RANDOM % 255]
  606. stickdr2=$[$RANDOM % 255]
  607. stickdr3=$[$RANDOM % 255]
  608. stickdr4=$[$RANDOM % 255]
  609. stickdc=$[$RANDOM % 255]
  610. stickdc2=$[$RANDOM % 255]
  611. stickdc3=$[$RANDOM % 255]
  612. # Εκκίνηση IDSwakeup για παραγωγή επιθέσεων
  613. if [ "$p" = 21 ] ; then
  614. ./IDSwakeup "${IP[$IPx]}" "${des[$desx]}" $wakeupnum $wakeupttl
  615. fi
  616. # Χρήση Sneeze και εισαγωγή ruleset σε αυτό
  617. if [ "$p" = 22 ] ; then
  618. ./sneeze.pl -d "${des[$desx]}" -c $sneezecounter -f /usr/local/snort/community-rules/community.rules -i eth1 -s "${IP[$IPx]}" -x -p $sneezeport
  619. fi
  620. # Χρήση Snot και εισαγωγή ruleset σε αυτό
  621. if [ "$p" = 23 ] ; then
  622. ./snot -r /usr/local/snort/community-rules/community.rules -s "${IP[$IPx]}" -d "${des[$desx]}" -n $snotnum -l $snotdelay -p $sneezeport
  623. fi
  624. # Command-line παράμετροι για το Stick
  625. if [ "$p" = 24 ] ; then
  626. ./stick sH "${IP[$IPx]}" sC $sticksc"."$sticksc2"."$sticksc3".0" sR $sticksr"."$sticksr2"."$sticksr3"."$sticksr4 dH "${des[$desx]}" dC $stickdc"."$stickdc2"."$stickdc3".0" dR $stickdr"."$stickdr2"."$stickdr3"."$stickdr4
  627. fi
  628. epbfile=$[$RANDOM]
  629. epbsize=$[$RANDOM]
  630. epbinterval=$[$RANDOM]
  631. epbdelay=$[$RANDOM]
  632. epbamount=$[$RANDOM]
  633. epbverion=$(( ( RANDOM % 2 ) + 1 ))
  634. epbether=$[$RANDOM % 100]
  635. # Ethernet packet bombardier
  636. if [ "$p" = 25 ] ; then
  637. epb -v -H -S $epbfile -n eth1 -t "${des[$desx]}" -s $epbsize -j -i -u $epbinterval -F $epbversion -a $epbamount -d $epbdelay -C "${HEX[$hexrand]}" -T "${HEXZ[$hexrand]}" -E $epbether
  638. fi
  639. packethfile=$[$RANDOM]
  640. packethdelay=$[$RANDOM]
  641. packethnumber=$[$RANDOM]
  642. packeths1=$[$RANDOM]
  643. packeths2=$[$RANDOM]
  644. packeths3=$[$RANDOM]
  645. packethperiod=$[$RANDOM]
  646. if [ "$p" = 26 ] ; then
  647. ./packETHcli -i eth1 -m 1 -f $packethfile".pcap"
  648. fi
  649. if [ "$p" = 27 ] ; then
  650. ./packETHcli -i eth1 -m 2 -d $packethdelay -n $packethnumber -s "$packeths1 $packeths2 $packeths3" -p $packethperiod -f $$packethfile".pcap"
  651. fi
  652. if [ "$p" = 28 ] ; then
  653. ./packETHcli -i eth1 -m 3 -f $packethfile".pcap"
  654. fi
  655. # scapysend.py
  656. #
  657. # #! /usr/bin/env python
  658. # from scapy.all import *
  659. # send(IP(dst="1.2.3.4")/ICMP())
  660. # sendp(Ether()/IP(dst="100.0.0.5",ttl=(1,4)),
  661. # iface="eth1")
  662. if [ "$p" = 29 ] ; then
  663. chmod +x scapysend.py
  664. ./scapysend.py
  665. fi
  666. # scapysendrec.py
  667. #
  668. # #! /usr/bin/env python
  669. # from scapy.all import *
  670. # ans,unans=sr(IP(dst="120.0.0.4",ttl=5)/ICMP())
  671. # ans.nsummary()
  672. # unans.nsummary()
  673. # p=sr1(IP(dst="100.0.0.2")/ICMP()/"XXXXXX")
  674. # p.show()
  675. if [ "$p" = 30 ] ; then
  676. chmod +x scapysendrec.py
  677. ./scapysendrec.py
  678. fi
  679. # scapysr.py
  680. #
  681. # #! /usr/bin/env python
  682. # import sys
  683. # from scapy.all import sr1,IP,ICMP
  684. #
  685. # p=sr1(IP(dst=sys.argv[1])/ICMP())
  686. # if p:
  687. # p.show()
  688. if [ "$p" = 31 ] ; then
  689. chmod +x scapysr.py
  690. ./scapysr.py "${des[$desx]}"
  691. fi
  692. # arping2tex.py
  693. #
  694. # #! /usr/bin/env python
  695. # from scapy.all import srp,Ether,ARP,conf
  696. #
  697. # if len(sys.argv) != 2:
  698. # print "Usage: arping2tex <net>\n eg: arping2text 100.0.0.1/24"
  699. # sys.exit(1)
  700. #
  701. # conf.verb=0
  702. # ans,unans=srp(Ether(dst="ff:ff:ff:ff:ff:ff")/ARP(pdst=sys.argv[1]),
  703. # timeout=2)
  704. #
  705. # print r"\begin{tabular}{|l|l|}"
  706. # print r"\hline"
  707. # print r"MAC & IP\\"
  708. # print r"\hline"
  709. # for snd,rcv in ans:
  710. # print rcv.sprintf(r"%Ether.src% & %ARP.psrc%\\")
  711. # print r"\hline"
  712. # print r"\end{tabular}"
  713. if [ "$p" = 32 ] ; then
  714. chmod +x arping2tex.py
  715. ./arping2tex.py
  716. fi
  717. # rule2alert για παραγωγή κακόβουλης κυκλοφορίας
  718. rule2alertsid=$[$RANDOM]
  719. rule2alertnum=$[$RANDOM]
  720. if [ "$p" = 33 ] ; then
  721. python r2a.py -f /usr/local/snort/community-rules/community.rules -c /usr/local/snort/etc/snort.conf -m "${IP[$IPx]}" -e "${des[$desx]}" -w /home/fanis/Desktop/awesome.pcap -s $rule2alertsid -n $rule2alertnum -t
  722. fi
  723. if [ "$p" = 34 ] ; then
  724. python r2a.py -f /usr/local/snort/rules/dos.rules -m "${IP[$IPx]}" -e "${des[$desx]}" -w /home/fanis/Desktop/awesome.pcap -s $rule2alertsid -n $rule2alertnum
  725. fi
  726. if [ "$p" = 35 ] ; then
  727. python r2a.py -f /usr/local/snort/rules/blacklist.rules -c /usr/local/snort/etc/snort.conf -m "${IP[$IPx]}" -e "${des[$desx]}" -w /home/fanis/Desktop/awesome.pcap -s $rule2alertsid -n $rule2alertnum -t
  728. fi
  729. if [ "$p" = 36 ] ; then
  730. python r2a.py -f /usr/local/snort/rules/dns.rules -c /usr/local/snort/etc/snort.conf -m "${IP[$IPx]}" -e "${des[$desx]}" -w /home/fanis/Desktop/awesome.pcap -s $rule2alertsid -n $rule2alertnum -t
  731. fi
  732. bitwists=$[$RANDOM]
  733. bitwistl=$[$RANDOM]
  734. bitwistc=$[$RANDOM]
  735. bitwistm=$[$RANDOM]
  736. bitwistr=$[$RANDOM]
  737. bitwistp=$[$RANDOM]
  738. if [ "$p" = 37 ] ; then
  739. bittwist -i eth1 /home/fanis/Desktop/031120130168.pcap -v -s $bitwists -l $bitwistl -c $bitwistc -m $bitwistm -r $bitwistr -p $bitwistp -h
  740. fi
  741. pfsendg=$[$RANDOM]
  742. pfsendl=$[$RANDOM]
  743. pfsendn=$[$RANDOM]
  744. pfsendr=$[$RANDOM]
  745. pfsendb=$[$RANDOM]
  746. pfsendw=$[$RANDOM]
  747. if [ "$p" = 38 ] ; then
  748. pfsend -i eth1 -a -f 0101011101.pcap -g $pfsendg -l $pfsendl -n $pfsendn -r $pfsendr -b $pfsendb -w $pfsendw -h
  749. fi
  750. done

comments powered by Disqus