#!/usr/bin/env python
import sys
from socket import *
usage = "Usage: ./clientChat.py <Listening Port>"
if (len(sys.argv) > 1):
LPORT = int(sys.argv[1])
else:
sys.exit(usage)
LOCALHOST = ''
BUFSIZE = 1024
ADDR = (LOCALHOST, LPORT)
serverID = ''
portNumb = ''
tcpChatSocket = socket(AF_INET, SOCK_STREAM)
tcpChatSocket.bind(ADDR)
tcpChatSocket.listen(5)
chatID = raw_input('Enter you chat ID: ')
chatConversation = raw_input('"W" to wait for a connection, or press "I" to initiate a conversation. ')
while True:
if chatConversation == "W":
if serverID == '':
print "Waiting for the connection..."
tcpMySocket, ADDR = tcpChatSocket.accept()
while True:
data = tcpMySocket.recv(BUFSIZE)
print data
if not data:
break
chatConversation = "I"
elif chatConversation == "I":
if serverID == '':
serverID = raw_input('Enter friends IP Address: ')
if portNumb == '':
portNumb = int(raw_input('Enter listening port for chat: '))
tcpFriendSocket = socket(AF_INET, SOCK_STREAM)
remoteADDR = (serverID, portNumb)
tcpFriendSocket.connect(remoteADDR)
chatData = raw_input('> ')
if not chatData:
break
tcpFriendSocket.send('[%s] %s' % (chatID, chatData))
tcpFriendSocket.close()
chatConversation = "W"
Twitter: @lokut
This blog is for educational purposes only. The opinions expressed in this blog are my own and do not reflect the views of my employers.
Subscribe to:
Post Comments (Atom)
Test Authentication from Linux Console using python3 pexpect
Working with the IT420 lab, you will discover that we need to discover a vulnerable user account. The following python3 script uses the pex...
-
Here is a quick walk through of GetBoo. The first item that I found was you can harvest the usernames of the existing users that are regist...
-
As I was glancing through the logs of my honeypots I spent some time to look at the following logs. In the past I have just overlooked them...
-
I thought I would work through a few of these web applications provided by OWASP on their broken web applications VM. The first one I th...
-
Today looking at the logs of the honeypots, I became curious based on the whois of the IP Addresses attempting to login to SSH which country...
-
Recently I was doing some scanning with a tool that is available on github called masscan. The tool allows you to configure a configuration...
No comments:
Post a Comment