Skip to content

Commit 59dab56

Browse files
authored
Merge pull request TheAlgorithms#172 from ghost/master
path-1 forwarding ports with meterpreter API using namespaces with gui supported C# program. look at open ai.lnk file to see more.
2 parents eb9fe88 + 85a599d commit 59dab56

File tree

2 files changed

+57
-0
lines changed

2 files changed

+57
-0
lines changed

other/password_generator.py

+14
Original file line numberDiff line numberDiff line change
@@ -12,3 +12,17 @@
1212
password = ''.join(random.choice(chars) for x in range(random.randint(min_length, max_length)))
1313
print('Password: ' + password)
1414
print('[ If you are thinking of using this passsword, You better save it. ]')
15+
# ALTERNATIVE METHODS
16+
# ctbi= characters that must be in password
17+
# i= how many letters or characters the password length will be
18+
def password_generator(ctbi, i):
19+
# Password generator = full boot with random_number, random_letters, and random_character FUNCTIONS
20+
def random_number(ctbi, i):
21+
22+
23+
24+
def random_letters(ctbi, i):
25+
26+
27+
28+
def random_characters(ctbi, i):

server.py

+43
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
# all imports - including #s
2+
import socket
3+
#import os
4+
#import sys
5+
#import subprocess
6+
# end of imports
7+
# the below classes will clarify what information is for the attacker and client
8+
class Termrequire:
9+
host = socket.gethostname()
10+
port = 3333 # fake numeral for the moment
11+
class Clientrequire:
12+
host = socket.gethostname()
13+
port = 2222 # fake numeral for the moment
14+
#CORE REQUIREMENTS OF PROGRAM:
15+
### host ip = server ip
16+
### potential connection hosts info (host, port)
17+
### user.config
18+
### user.config
19+
# using SERVER for connections and linux meterpreter sessions
20+
# SERVER DETAILS:
21+
#5 client availability for pivoting #although that is not yet available in a regular form of
22+
#exploitation - we have to go with what we have.
23+
24+
# #learnmore - USER_CONFIG
25+
# server ip will be displayed every connection at version 2.0
26+
# terminal attacker socket object creation
27+
t = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
28+
# terminal attacker socket binding
29+
t.bind()
30+
# terminal attacker socket listen
31+
t.listen()
32+
# client socket object creation
33+
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
34+
# binding information with s.bind method
35+
s.bind()
36+
#listening for connections with s.listen method
37+
s.listen(1)
38+
# server_functionality waits for terminal shell and then gets client information connectivity
39+
def func4client():
40+
s.accept()
41+
# terminal functionality for attacker - I will definitely customize it soon. Maybe tkinter?
42+
def func4term():
43+
t.accept()

0 commit comments

Comments
 (0)