File tree 2 files changed +57
-0
lines changed
2 files changed +57
-0
lines changed Original file line number Diff line number Diff line change 12
12
password = '' .join (random .choice (chars ) for x in range (random .randint (min_length , max_length )))
13
13
print ('Password: ' + password )
14
14
print ('[ If you are thinking of using this passsword, You better save it. ]' )
15
+ # ALTERNATIVE METHODS
16
+ # ctbi= characters that must be in password
17
+ # i= how many letters or characters the password length will be
18
+ def password_generator (ctbi , i ):
19
+ # Password generator = full boot with random_number, random_letters, and random_character FUNCTIONS
20
+ def random_number (ctbi , i ):
21
+
22
+
23
+
24
+ def random_letters (ctbi , i ):
25
+
26
+
27
+
28
+ def random_characters (ctbi , i ):
Original file line number Diff line number Diff line change
1
+ # all imports - including #s
2
+ import socket
3
+ #import os
4
+ #import sys
5
+ #import subprocess
6
+ # end of imports
7
+ # the below classes will clarify what information is for the attacker and client
8
+ class Termrequire :
9
+ host = socket .gethostname ()
10
+ port = 3333 # fake numeral for the moment
11
+ class Clientrequire :
12
+ host = socket .gethostname ()
13
+ port = 2222 # fake numeral for the moment
14
+ #CORE REQUIREMENTS OF PROGRAM:
15
+ ### host ip = server ip
16
+ ### potential connection hosts info (host, port)
17
+ ### user.config
18
+ ### user.config
19
+ # using SERVER for connections and linux meterpreter sessions
20
+ # SERVER DETAILS:
21
+ #5 client availability for pivoting #although that is not yet available in a regular form of
22
+ #exploitation - we have to go with what we have.
23
+
24
+ # #learnmore - USER_CONFIG
25
+ # server ip will be displayed every connection at version 2.0
26
+ # terminal attacker socket object creation
27
+ t = socket .socket (socket .AF_INET , socket .SOCK_STREAM )
28
+ # terminal attacker socket binding
29
+ t .bind ()
30
+ # terminal attacker socket listen
31
+ t .listen ()
32
+ # client socket object creation
33
+ s = socket .socket (socket .AF_INET , socket .SOCK_STREAM )
34
+ # binding information with s.bind method
35
+ s .bind ()
36
+ #listening for connections with s.listen method
37
+ s .listen (1 )
38
+ # server_functionality waits for terminal shell and then gets client information connectivity
39
+ def func4client ():
40
+ s .accept ()
41
+ # terminal functionality for attacker - I will definitely customize it soon. Maybe tkinter?
42
+ def func4term ():
43
+ t .accept ()
You can’t perform that action at this time.
0 commit comments