diff --git a/Makefile b/Makefile index f5dec79..9e7cb5b 100644 --- a/Makefile +++ b/Makefile @@ -10,6 +10,7 @@ up: @echo "Building and starting $(NAME) project..." docker-compose -f $(COMPOSE_FILE) up --build -d @echo "Project started successfully!" + docker exec -it inquisitor /bin/bash # Stop containers and remove images down: diff --git a/inquisitor/entrypoint.sh b/inquisitor/entrypoint.sh index 9eb84ab..25cc3b8 100644 --- a/inquisitor/entrypoint.sh +++ b/inquisitor/entrypoint.sh @@ -43,6 +43,15 @@ source /opt/venv/bin/activate echo "Starting ARP spoofing attack..." # Run Python with unbuffered output and force line buffering -PYTHONUNBUFFERED=1 python3 -u /app/src/inquisitor.py $TARGET_IP $TARGET_MAC $GATEWAY_IP $GATEWAY_MAC +# PYTHONUNBUFFERED=1 python3 -u /app/src/inquisitor.py $TARGET_IP $TARGET_MAC $GATEWAY_IP $GATEWAY_MAC -echo "Python script exited with code: $?" \ No newline at end of file +# echo "Python script exited with code: $?" + +echo "Starting interactive shell..." +echo "You can now run:" +echo " python3 /app/src/inquisitor.py $TARGET_IP $TARGET_MAC $GATEWAY_IP $GATEWAY_MAC" +echo " Or use Python interactively with: python3 -i /app/src/inquisitor.py" +echo "" + +# Start an interactive bash shell +exec /bin/bash \ No newline at end of file diff --git a/inquisitor/src/inquisitor.py b/inquisitor/src/inquisitor.py index 1833b56..c775948 100755 --- a/inquisitor/src/inquisitor.py +++ b/inquisitor/src/inquisitor.py @@ -44,12 +44,13 @@ def ftp_packet_callback(packet): if b"RETR" in bytes(packet['TCP'].payload): # Extract filename from FTP RETR command payload = bytes(packet['TCP'].payload).decode(errors='ignore') + print(f"the FTP payload: {payload}") parts = payload.split() if "RETR" in parts: idx = parts.index("RETR") if idx + 1 < len(parts): filename = parts[idx + 1] - print(f"FTP file download detected: {filename}") + print(f"\033[92mFTP file download detected: {filename}\033[0m") def start_sniffing(interface=conf.iface): """