-
Notifications
You must be signed in to change notification settings - Fork 0
/
menu_files.py
60 lines (55 loc) · 2.76 KB
/
menu_files.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
from main import *
from scapy.all import*
from attacks import *
import os
import time
menudict = {
"mod_attack_IP": "Modify attacker IP address",
"mod_target_IP": "Modify target IP address",
"mod_target_port": "Modify target port number",
"SYN_flood": "SYN flood attack",
"ACK_flood": "ACK flood attack",
"lpacket": "Long packet attack",
"httphackery": "Malformed HTTP request",
"udpteardrop": "Fragmented UDP packet with malformed offset",
"TCPteardrop": "Fragmented TCP packet with malformed offset",
"ARPSpoof": "ARP spoofing for MIM",
"telnet_long": "Telnet long string attack",
}
def printsplash():
print("""
+---------------------------------------------------------------------------+
| __________ __________ .__ |
| \____ /___________ ____ \______ \__ __ _____| |__ |
| / // __ \_ __ \/ ___\ ______ | _/ | \/ ___/ | \ |
| / /\ ___/| | \/ /_/ > /_____/ | | \ | /\___ \| Y \ |
| /_______ \___ >__| \___ / |____|_ /____//____ >___| / |
| \/ \/ /_____/ \/ \/ \/ |
+---------------------------------------------------------------------------+
| Welcome to Zerg rush, a simple network attacking tool. |
+---------------------------------------------------------------------------+
| Peter Lee, UIUC 2022|
| peterwlee.web.illinois.edu|
| Github.com/wonjongbot|
+---------------------------------------------------------------------------+
""")
def printInfo(src, dst, dport):
# if destination port is normal, promopt normal info
if (dport != -1):
print("[*] Attack information:\n Attacker IP: "+src+"\n Target IP: "+dst+"\n Target port number: "+str(dport)+"\n")
else:
print("[*] Attack information:\n Attacker IP: "+src+"\n Target IP: "+dst+"\n Target port number: NULL\n")
# cases for when user argument does not exist
if (src == "NULL"):
print("[!] Attacker IP address is NULL. Please use opiton 3 to enter argument.")
if (dst == "NULL"):
print("[!] Target IP address is NULL. Please use opiton 3 to enter argument.")
if (dport == int("-1")):
print("[!] Target port is NULL. Please use opiton 3 to enter argument.\n")
def printOption():
print("[*] Please select options below:")
i = 1
for k in menudict.items():
print(" "+str(i)+". "+k[1])
i+=1