Web User Interface for Hacking Functionality

Discussion in 'Scripts & Commands' started by Mr. Penguin, 19 Jan 2013.

  1. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member Admin Moderator VIP

    Joined:
    18 May 2012
    Messages:
    3,087
    Likes Received:
    1,187
    Trophy Points:
    351
    It’s a Web User Interface with hacking functionalities.

    Screenshot_Bl4ck0ps_Pro_Mozilla_Firefox_1.jpg

    Installation
    1. Decompress uwui.tar.gz in /var/www
    2. Run visudo and add the lines:
    Code:
    Select All
    www-data ALL=NOPASSWD: ALL
    Code:
    Select All
    cp /var/www/uwui/bin/bin_intel/* /usr/bin
    Code:
    Select All
    cp /var/www/uwui/bin/scripts/* /usr/bin
    3. Start Apache:
    Code:
    Select All
    /etc/init.t/apache2 start
    4. In Firefox go to http://127.0.0.1/uwui

    ip_actions.png

    Tips
    To show the info window of a node click over the icon
    To show the actions window of a node click over the zone of the text.

    If you want help me with the look and feel of the interface you need modify the files:
    Code:
    Select All
    /var/www/uwui/css/uwui.css
    Code:
    Select All
    /var/www/uwui/php/uwui_function.php
    If you want help add new actions (new wifi attacks, etc …) or new info in info windows you need modify the files:
    Code:
    Select All
    /var/www/uwui/php/uwui_actions.php
    Code:
    Select All
    /var/www/uwui/php/uwui_info.php
    Example Actions:
    Code:
    Select All
    if ($tipo==”monitor” ) { action(“airmon-ng stop $valor”,”"); echo “<hr color=’green’>”; action_bg(“airodump-ng –output-format csv -w ../data/captura $valor 1>/dev/null 2>/dev/null”,”Airodump CSV”); action_bg(“airodump-ng –output-format pcap -w ../data/captura $valor 1>/dev/null 2>/dev/null”,”Airodump PCAP”); action_bg(“airodump-ng –output-format csv,pcap -w ../data/captura $valor 1>/dev/null 2>/dev/null”,”Airodump CSV,PCAP”); }
    01_info.png

    Other Example:
    Code:
    Select All
    if ($tipo==”system”) { echo “<PRE>”; echo “<U>TOP</U>\n”; system(“sudo top -b -n 1 | head -15″); echo “<hr color=green>\n”; echo “<U>ROUTE</U>\n”; system(“sudo route -n”); echo “<hr color=green>\n”; echo “<U>IPTABLES</U>\n”; system(“sudo iptables –table nat –list|grep .”); echo “<hr color=green>\n”; echo “<U>IP FORWARD</U>\n”; echo “IP Forward: “; system(“sudo cat /proc/sys/net/ipv4/ip_forward”); echo “</PRE>”; }
    If you want help optimising or debugging you need modify the file:
    Code:
    Select All
    /var/www/uwui/php/uwui_core.php
    Download: uwui_04.tar.gz (266.17 KB)
    Resources: http://www.backtrack-linux.org/forums/showthread.php?t=56533
     
  2. firesheep

    firesheep Well-Known Member
    Donator I

    Joined:
    10 Jul 2012
    Messages:
    53
    Likes Received:
    8
    Trophy Points:
    120
    sorry where I need to change this script
    www-data ALL=NOPASSWD: ALL
     
  3. Mr. Penguin

    Mr. Penguin Administrator
    Staff Member Admin Moderator VIP

    Joined:
    18 May 2012
    Messages:
    3,087
    Likes Received:
    1,187
    Trophy Points:
    351
  4. firesheep

    firesheep Well-Known Member
    Donator I

    Joined:
    10 Jul 2012
    Messages:
    53
    Likes Received:
    8
    Trophy Points:
    120
    ok bro I still do not understand this part
    2 - Run visudo and add the line:
    www-data ALL=NOPASSWD: ALL
     
Loading...
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K