File tree 2 files changed +57
-0
lines changed
2 files changed +57
-0
lines changed Original file line number Diff line number Diff line change 12
12
password = ''.join(random.choice(chars) for x in range(random.randint(min_length, max_length)))
13
13
print('Password: ' + password)
14
14
print('[ If you are thinking of using this passsword, You better save it. ]')
15
+ # ALTERNATIVE METHODS
16
+ # ctbi= characters that must be in password
17
+ # i= how many letters or characters the password length will be
18
+ def password_generator(ctbi, i):
19
+ # Password generator = full boot with random_number, random_letters, and random_character FUNCTIONS
20
+ def random_number(ctbi, i):
21
+
22
+
23
+
24
+ def random_letters(ctbi, i):
25
+
26
+
27
+
28
+ def random_characters(ctbi, i):
Original file line number Diff line number Diff line change
1
+ # all imports - including #s
2
+ import socket
3
+ #import os
4
+ #import sys
5
+ #import subprocess
6
+ # end of imports
7
+ # the below classes will clarify what information is for the attacker and client
8
+ class Termrequire:
9
+ host = socket.gethostname()
10
+ port = 3333 # fake numeral for the moment
11
+ class Clientrequire:
12
+ host = socket.gethostname()
13
+ port = 2222 # fake numeral for the moment
14
+ #CORE REQUIREMENTS OF PROGRAM:
15
+ ### host ip = server ip
16
+ ### potential connection hosts info (host, port)
17
+ ### user.config
18
+ ### user.config
19
+ # using SERVER for connections and linux meterpreter sessions
20
+ # SERVER DETAILS:
21
+ #5 client availability for pivoting #although that is not yet available in a regular form of
22
+ #exploitation - we have to go with what we have.
23
+
24
+ # #learnmore - USER_CONFIG
25
+ # server ip will be displayed every connection at version 2.0
26
+ # terminal attacker socket object creation
27
+ t = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
28
+ # terminal attacker socket binding
29
+ t.bind()
30
+ # terminal attacker socket listen
31
+ t.listen()
32
+ # client socket object creation
33
+ s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
34
+ # binding information with s.bind method
35
+ s.bind()
36
+ #listening for connections with s.listen method
37
+ s.listen(1)
38
+ # server_functionality waits for terminal shell and then gets client information connectivity
39
+ def func4client():
40
+ s.accept()
41
+ # terminal functionality for attacker - I will definitely customize it soon. Maybe tkinter?
42
+ def func4term():
43
+ t.accept()
You can’t perform that action at this time.
0 commit comments