Defense Support System
Project description
#Defense Support System
###UI
- python dss.py start
- python dss.py parse
###GUI
- python dss_gui.py
###At this point of the project, the program has been tested in:
- (32-bit and 64-bit) Windows 7 and Windows 10
- (32-bit) Kali Linux
----------------
Linux Environment
----------------
You will need to install autopy. The easiest method thus far has been to run the following commands.
```Shell
- $ sudo apt-get install libxtst-dev
- $ sudo pip install autopy
```
----------------
Windows Environment
----------------
The following installations are needed to run the system on a Windows machine.
###PYGTK
System uses version: 2.24
- http://ftp.gnome.org/pub/GNOME/binaries/win32/pygtk/2.24/
The specific link for this version is provided below:
pygtk-all-in-one-2.24.2.win32-py2.7.msi 2012-02-09 21:48 32M
Direct Link
- http://ftp.gnome.org/pub/GNOME/binaries/win32/pygtk/2.24/pygtk-all-in-one-2.24.2.win32-py2.7.msi
###AutoPy
System uses version: 0.51
- https://pypi.python.org/pypi/autopy/
Plugins
-----------
The following installations are needed to run the plugins on a Windows machichine.
###Keylogger
- PIL http://www.pythonware.com/products/pil/
- ConfigObj http://www.voidspace.org.uk/python/configobj.html
- pyHook https://sourceforge.net/projects/pyhook/
- PyWin32 https://sourceforge.net/projects/pywin32/files/pywin32/Build%20220/
###Tshark
- https://www.wireshark.org/download.html
###Nmap
- https://nmap.org/download.html#windows
After installing tShark and nmap from the links below follow the remaining steps:
1. In the Windows command prompt type: `tshark -D`
2. Copy the long string between brackets {} for "Wi-Fi" or "Ethernet"
3. In tShark's run.bat file, place between the brackets for \Device\NPF_{<enter here>}
4. In netscanner's config.json file enter all of the data listed into the file.
(Step 1 & 2) (Example, all machines will differ in output)
```Shell
C:\Users\johnDoe>tshark -D
1. \Device\NPF_{12345...} (VMware Network Adapter VMnet1)
2. \Device\NPF_{0123456789-E123-A12 (Wi-Fi)
3. \\.\USBPcap1 (USBPcap1)
```
(Step 3) tshark - run.bat
```Batch
echo off
set output=%1
for /f "tokens=2 delims==" %%a in ('wmic OS Get localdatetime /value') do set "dt=%%a"
set "YY=%dt:~2,2%" & set "YYYY=%dt:~0,4%" & set "MM=%dt:~4,2%" & set "DD=%dt:~6,2%"
set "HH=%dt:~8,2%" & set "Min=%dt:~10,2%" & set "Sec=%dt:~12,2%"
set "datestamp=%YYYY%%MM%%DD%" & set "timestamp=%HH%%Min%%Sec%"
"C:\Program Files (x86)\Wireshark\tshark.exe" -i \Device\NPF_{123456789-1234-1234-1234-123456789} -w %output%\%datestamp%%timestamp%.pcap > NUL
echo on
```
(Step 4) netscanner - config.json
```JSON
{
"name": "netscanner",
"type": "multi",
"enabled": false,
"parser": "plugins.netscanner.parser",
"output": "raw",
"arguments": [
["\\Device\\NPF_{123456789-1234-1234-1234-12345}", "VMware Network Adapter VMnet1"],
["\\Device\\NPF_{123456789-1234-1234-1234-12345}", "Wi-Fi"]
]
}
###UI
- python dss.py start
- python dss.py parse
###GUI
- python dss_gui.py
###At this point of the project, the program has been tested in:
- (32-bit and 64-bit) Windows 7 and Windows 10
- (32-bit) Kali Linux
----------------
Linux Environment
----------------
You will need to install autopy. The easiest method thus far has been to run the following commands.
```Shell
- $ sudo apt-get install libxtst-dev
- $ sudo pip install autopy
```
----------------
Windows Environment
----------------
The following installations are needed to run the system on a Windows machine.
###PYGTK
System uses version: 2.24
- http://ftp.gnome.org/pub/GNOME/binaries/win32/pygtk/2.24/
The specific link for this version is provided below:
pygtk-all-in-one-2.24.2.win32-py2.7.msi 2012-02-09 21:48 32M
Direct Link
- http://ftp.gnome.org/pub/GNOME/binaries/win32/pygtk/2.24/pygtk-all-in-one-2.24.2.win32-py2.7.msi
###AutoPy
System uses version: 0.51
- https://pypi.python.org/pypi/autopy/
Plugins
-----------
The following installations are needed to run the plugins on a Windows machichine.
###Keylogger
- PIL http://www.pythonware.com/products/pil/
- ConfigObj http://www.voidspace.org.uk/python/configobj.html
- pyHook https://sourceforge.net/projects/pyhook/
- PyWin32 https://sourceforge.net/projects/pywin32/files/pywin32/Build%20220/
###Tshark
- https://www.wireshark.org/download.html
###Nmap
- https://nmap.org/download.html#windows
After installing tShark and nmap from the links below follow the remaining steps:
1. In the Windows command prompt type: `tshark -D`
2. Copy the long string between brackets {} for "Wi-Fi" or "Ethernet"
3. In tShark's run.bat file, place between the brackets for \Device\NPF_{<enter here>}
4. In netscanner's config.json file enter all of the data listed into the file.
(Step 1 & 2) (Example, all machines will differ in output)
```Shell
C:\Users\johnDoe>tshark -D
1. \Device\NPF_{12345...} (VMware Network Adapter VMnet1)
2. \Device\NPF_{0123456789-E123-A12 (Wi-Fi)
3. \\.\USBPcap1 (USBPcap1)
```
(Step 3) tshark - run.bat
```Batch
echo off
set output=%1
for /f "tokens=2 delims==" %%a in ('wmic OS Get localdatetime /value') do set "dt=%%a"
set "YY=%dt:~2,2%" & set "YYYY=%dt:~0,4%" & set "MM=%dt:~4,2%" & set "DD=%dt:~6,2%"
set "HH=%dt:~8,2%" & set "Min=%dt:~10,2%" & set "Sec=%dt:~12,2%"
set "datestamp=%YYYY%%MM%%DD%" & set "timestamp=%HH%%Min%%Sec%"
"C:\Program Files (x86)\Wireshark\tshark.exe" -i \Device\NPF_{123456789-1234-1234-1234-123456789} -w %output%\%datestamp%%timestamp%.pcap > NUL
echo on
```
(Step 4) netscanner - config.json
```JSON
{
"name": "netscanner",
"type": "multi",
"enabled": false,
"parser": "plugins.netscanner.parser",
"output": "raw",
"arguments": [
["\\Device\\NPF_{123456789-1234-1234-1234-12345}", "VMware Network Adapter VMnet1"],
["\\Device\\NPF_{123456789-1234-1234-1234-12345}", "Wi-Fi"]
]
}
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
dss-0.8.tar.gz
(233.5 kB
view details)
File details
Details for the file dss-0.8.tar.gz
.
File metadata
- Download URL: dss-0.8.tar.gz
- Upload date:
- Size: 233.5 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | dd2c73856ebd49d94912ce5a82af9a5e1ab1822bbec37417f63d25cae8aab20f |
|
MD5 | 1b8fd9439e6a4c3a712288c743c158c4 |
|
BLAKE2b-256 | 826deedc6c344410a91eec1eee80ca53719d1b43c333d919c9fa1638938a6262 |