User Controls

ATTN: thelittlestnigger

  1. #1
    Sophie Pedophile Tech Support
    Since you requested i post the tool i was working on with Black Hat Python i am pleased to report i just finished the script. like i said it's a simple alternative to netcat and all in all i think it turned out pretty neat, of course it won't win any originality prices since it's based on the examples and techniques described in the book. I haven't gotten around to testing everything yet but i checked for errors and debugged where needed so i'm pretty confident it will do what it's supposed to. Take a moment to review the relevant code below should you desire.


    # PyCat is a python replacement for Netcat

    import sys
    import socket
    import getopt
    import threading
    import subprocess


    # Define global variables
    listen = False
    command = False
    upload = False
    execute = ""
    target = ""
    upload_destination = ""
    port = 0


    # Usage/Help function
    def usage():

    # ASCII Logo
    # Copying and pasting ASCII from the script doesn't work quite well within the context of the code tags for some reason.
    # ASCII Logo

    # Help text
    print
    print
    print "PyCat Net Tool"
    print
    print "Usage: PyCat.py -t target_host -p port"
    print
    print "-l --listen"
    print "listen on [host]:[port] for incoming connections"
    print
    print "-c --command"
    print "Initialize a command shell"
    print
    print "-e --execute=file_to_run"
    print "Execute file upon connection"
    print
    print "-u --upload=destination"
    print "Upon connection upload file and write to [destination]"
    print
    print "Examples: "
    print "PyCat.py -t 192.168.0.1 -p 5555 -l -c"
    print "PyCat.py -t 192.168.0.1 -p 5555 -l -u=c:\\target.exe"
    print "Pycat.py -t 192.168.0.1 -p 5555 -l -e=\"cat /etc/passwd\""
    print "echo 'ABCDEFGHI' | ./PyCat.py -t 192.168.11.12 -p 135"
    sys.exit(0)


    def client_sender(buffer):

    client = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

    try:
    # Connect to target host
    client.connect((target,port))
    # Check for input from stdin, if input is present send to remote target
    if len(buffer):
    client.send(buffer)

    # Recieve data back until there is no more data to recieve
    while True:

    # Wait for data response
    recv_len = 1
    response = ""

    while recv_len:

    data = client.recv(4096)
    recv_len = len(data)
    response+= data

    if recv_len < 4096:
    break

    print response,

    # Wait for more input
    buffer = raw_input("")
    buffer += "\n"

    # Send it off (Loop)
    client.send(buffer)

    except:
    print "
    [*] Exception! Exiting."

    # Close connection
    client.close()


    # Primary server loop and stub function to handle command execution and command shell
    def server_loop():
    global target

    # If no target is specified, we listen on all interfaces
    if not len(target):
    target = "0.0.0.0"

    server = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    server.bind((target,port))

    server.listen(5)

    while True:
    client_socket, addr = server.accept()

    # Spin off a thread to handle new client
    client_thread = threading.Thread(target=client_handler, args=(client_socket,))
    client_thread.start()


    def run_command(command):
    # Trim the new line
    command = command.rstrip()

    # Run command and retrieve output
    try:
    output = subprocess.check_output(command,stderr=subprocess.STDOUT, shell=True)
    except:
    output = "Failed to execute command. \r\n"

    # Send output back to the client
    return output


    def client_handler(client_socket):
    global upload
    global execute
    global command

    # Check for upload
    if len(upload_destination):
    # Read in all of the bytes and write to our destination
    file_buffer = ""
    # Keep reading data until none is available
    while True:
    data = client_socket.recv(1024)

    if not data:
    break
    else:
    file_buffer += data
    # Now we take these bytes and try to write them out
    try:
    file_descriptor = open(upload_destination,"wb")
    file_descriptor.write(file_buffer)
    file_descriptor.close()

    # Acknowledge that we wrote the file out
    client_socket.send("Succesfully saved file to %s\r\n" % upload_destination)
    except:
    client_socket.send("Failed to save file to %s\r\n" % upload_destination)

    if len(execute):
    # Run the command
    output = run_command(execute)

    client_socket.send(output)

    # Start another loop if command shell was requested
    if command:

    while True:
    # Show prompt
    client_socket.send("<BHP:#> ")

    # Now we recieve until we see a linefeed (enter key)
    cmd_buffer = ""
    while "\n" not in cmd_buffer:
    cmd_buffer += client_socket.recv(1024)

    # Send back the command output
    response = run_command(cmd_buffer)

    # Send the response back
    client_socket.send(response)


    # Main funtion
    def main():
    global listen
    global port
    global execute
    global command
    global upload_destination
    global target

    # Check if proper arguments are passed
    if not len(sys.argv[1:]):
    usage()

    # Read commandline options
    try:
    opts, args = getopt.getopt(sys.argv[1:],"hle:t:p:cu",["help","listen","execute","target","port","command","upload"])
    except getopt.GetoptError as err:
    print str(err)
    usage()

    for o,a in opts:
    if o in ("-h","--help"):
    usage()
    elif o in ("-1", "--listen"):
    listen = True
    elif o in ("-e", "--execute"):
    execute = a
    elif o in ("-c", "--commandshell"):
    command = True
    elif o in ("-u", "--upload"):
    upload_destination = a
    elif o in ("-p", "--port"):
    port = int(a)
    else:
    assert False,"Unhandled Option"


    # Are we going to listen or just send data from stdin?
    if not listen and len(target) and port > 0:

    # Read in the buffer from the commandline, this will block, so send end of file marker if not sending input to stdin
    buffer = sys.stdin.read()

    # Send data off
    client_sender(buffer)

    # We are going to listen and potentially upload things, execute commands and drop a shell back -
    # depending on the above commandline options
    if listen:
    server_loop

    main()


    Also note that the script reads from stdin until the end of file marker is recieved. I went ahead and added my script as a custom tool to PentestBox and this is what it looks like when you run it.



    I took the liberty of adding a nice ASCII logo because that's cool. Anyway, you should pick up the book bro, it's interesting, a fun read and certainly educational.
  2. #2
    Danks bruv. Ill definitly have to see if I can find a download for the book as it seems like a dank resource for infosecPy

    Just for that here is a wonderful vidya:

  3. #3
    Sophie Pedophile Tech Support
    Danks bruv. Ill definitly have to see if I can find a download for the book as it seems like a dank resource for infosecPy

    Just for that here is a wonderful vidya:


    Yeah bro, i think i got a download link somewhere, if i find it i'll post it. I also have Grey Hat Python by the way which is sort of like the prequel it has the same theme but also gets into some more general applications. Oh i found the link for a copy of Grey Hat Python it's a good place to start as well, i enjoyed the part about code and dll injection a lot from that one, haven't fully read it yet but i decided i'm gonna do black hat from cover to cover first.

    Also: Nice vid, i approve thanks breh. I dunno' if i asked this already but are you into lolis yourself?
  4. #4
    I can hebe but i aint got not time for chicks with no tits. So not much of a loli fan.

    Also thanks for the grey hat link. Maybe ill read that one and we can collab on some shit using our shared knowledge.
  5. #5
    Actually I just remembered I have a copy of black hat Python on my tablet. I think I'll start with that one then move to grey. How far are you in black hat?
  6. #6
    Sophie Pedophile Tech Support
    Actually I just remembered I have a copy of black hat Python on my tablet. I think I'll start with that one then move to grey. How far are you in black hat?

    Lol page 21, i just started it yesterday. Was busy on something else before then i wanted a new python project so i picked black hat up. It starts out simple with making a TCP client a UDP client and a TCP server and then dives into making this tool. Now i'll be coding and learning about scripting a TCP proxy.

    Also, yes hebe is good.
  7. #7
    Bradley Florida Man
    damn sophie left a major gap int his community

    this community gapes without sophie to plug it up
  8. #8
    the man who put it in my hood Black Hole [miraculously counterclaim my golf]
    goood b
  9. #9
    Bradley Florida Man
    hey scron how is ur friday going
Jump to Top