Giter Site home page Giter Site logo

jofpin / trape Goto Github PK

View Code? Open in Web Editor NEW
7.9K 351.0 1.3K 6.55 MB

People tracker on the Internet: OSINT analysis and research tool by Jose Pino

Home Page: https://x.com/jofpin

Python 67.32% JavaScript 12.34% HTML 20.34%
tracking osint footprint hacking-tool recognition phising social-engineering security python hacking

trape's Introduction

trape (stable) v2.0

People tracker on the Internet: Learn to track the world, to avoid being traced.


Trape is an OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services and control their users through their browser, without their knowledge, but It evolves with the aim of helping government organizations, companies and researchers to track the cybercriminals.

--trape header

At the beginning of the year 2018 was presented at BlackHat Arsenal in Singapore: https://www.blackhat.com/asia-18/arsenal.html#jose-pino and in multiple security events worldwide.

Some benefits

  • LOCATOR OPTIMIZATION: Trace the path between you and the target you're tracking. Each time you make a move, the path will be updated, the location of the target is obtained silently through a bypass made in the browsers, allowing you to skip the location request on the victim's side, and at the same time maintain a precision of 99% in the locator.

  • APPROACH: When you're close to the target, Trape will tell you.

  • REST API: Generates an API (random or custom), and through this you can control and monitor other Web sites on the Internet remotely, getting the traffic of all visitors.

  • PROCESS HOOKS: Manages social engineering attacks or processes in the target's browser.

    --- SEVERAL: You can issue a phishing attack of any domain or service in real time as well as send malicious files to compromise the device of a target.

    --- INJECT JS: You keep the JavaScript code running free in real time, so you can manage the execution of a keylogger or your own custom functions in JS which will be reflected in the target's browser.

    --- SPEECH: A process of audio creation is maintained which is played in the browser of the target, by means of this you can execute personalized messages in different voices with languages in Spanish and English.

  • PUBLIC NETWORK TUNNEL: Trape has its own API that is linked to ngrok.com to allow the automatic management of public network tunnels; So you can publish the content of your trape server which is executed locally to the Internet, to manage hooks or public attacks.

  • CLICK ATTACK TO GET CREDENTIALS: Automatically obtains the target credentials, recognizing your connection availability on a social network or Internet service.

  • NETWORK: You can get information about the user's network.

    --- SPEED: Viewing the target's network speed. (Ping, download, upload, type connection)

    --- HOSTS OR DEVICES: Here you can get a scan of all the devices that are connected in the target network automatically.

  • PROFILE: Brief summary of the target's behavior and important additional information about your device.

    --- GPU --- ENERGY

30-session recognition

Session recognition is one of trape most interesting attractions, since you as a researcher can know remotely what service the target is connected to.

  • USABILITY: You can delete logs and view alerts for each process or action you run against each target.

How to use it

First unload the tool.

git clone https://github.com/jofpin/trape.git
cd trape
python3 trape.py -h

If it does not work, try to install all the libraries that are located in the file requirements.txt

pip3 install -r requirements.txt

Example of execution

Example: python3 trape.py --url http://example.com --port 8080

If you face some problems installing the tool, it is probably due to Python versions conflicts, you should run a Python 2.7 environment :

pip3 install virtualenv
virtualenv -p /usr/bin/python3 trape_env
source trape_env/bin/activate
pip3 install -r requirements.txt
python3 trape.py -h

HELP AND OPTIONS

user:~$ python3 trape.py --help
usage: python3 trape.py -u <> -p <> [-h] [-v] [-u URL] [-p PORT]
                                              [-ak ACCESSKEY] [-l LOCAL]
                                              [--update] [-n] [-ic INJC]

optional arguments:
  -h, --help            show this help message and exit
  -v, --version         show program's version number and exit
  -u URL, --url URL     Put the web page url to clone
  -p PORT, --port PORT  Insert your port
  -ak ACCESSKEY, --accesskey ACCESSKEY
                        Insert your custom key access
  -l LOCAL, --local LOCAL
                        Insert your home file
  -n, --ngrok           Insert your ngrok Authtoken
  -ic INJC, --injectcode INJC
                        Insert your custom REST API path
  -ud UPDATE, --update UPDATE
                        Update trape to the latest version

--url In this option you add the URL you want to clone, which works as a decoy.

--port Here you insert the port, where you are going to run the trape server.

--accesskey You enter a custom key for the trape panel, if you do not insert it will generate an automatic key.

--injectcode trape contains a REST API to play anywhere, using this option you can customize the name of the file to include, if it does not, generates a random name allusive to a token.

--local Using this option you can call a local HTML file, this is the replacement of the --url option made to run a local lure in trape.

--ngrok In this option you can enter a token, to run at the time of a process. This would replace the token saved in configurations.

--version You can see the version number of trape.

--update Option used to upgrade to the latest version of trape.

--help It is used to see all the above options, from the executable.

Disclaimer

This tool has been published educational purposes. It is intended to teach people how bad guys could track them, monitor them or obtain information from their credentials, we are not responsible for the use or the scope that someone may have through this project.

We are totally convinced that if we teach how vulnerable things really are, we can make the Internet a safer place.

Developer

This development and others, the participants will be mentioned with name, Twitter and charge.

  • CREATOR

    --- Jose Pino - @jofpin - (Security Researcher)

Happy hacking!

I invite you, if you use this tool helps to share, collaborate. Let's make the Internet a safer place, let's report.

License

The content of this project itself is licensed under the Creative Commons Attribution 3.0 license, and the underlying source code used to format and display that content is licensed under the MIT license.

Copyright, 2018 by Jose Pino


trape's People

Contributors

aaronjanse avatar brandomr avatar captain-woof avatar cclauss avatar christhecoolhut avatar glitchfix avatar harshitm98 avatar ianket avatar jct94 avatar jerjet avatar jpyamamoto avatar noraj avatar st4nn avatar tdenisenko avatar timgates42 avatar uday-wahi avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

trape's Issues

flash-socketIO

flash-socketIO
try twice to install this
pip install flash-socketIO

link for targets doesn't work in mobile phones

i installed the tool everything is perfect i tried on myself.when i opened the victim link in my pc it worked perfectly . But when i tried to open the same link in smartphone, it simply doesn't load the site ,i tried several times.i wanted to know that this tool works only on pc's because it's doesn't work in smartphones.

SQL Insert error for some region

Look like the script do not like people from "Provence Alpes cote d'Azur" region (France)

Trape look to be insane anyway :)

: fd54b
[*] It's his first time
[2017-11-04 00:42:07,868] ERROR in app: Exception on /register [POST]
Traceback (most recent call last):
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1982, in wsgi_app
response = self.full_dispatch_request()
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1614, in full_dispatch_request
rv = self.handle_user_exception(e)
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1517, in handle_user_exception
reraise(exc_type, exc_value, tb)
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1612, in full_dispatch_request
rv = self.dispatch_request()
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1598, in dispatch_request
return self.view_functionsrule.endpoint
File "/root/trape/core/victim.py", line 61, in register
db.sentences_victim('insert_victim_geo', [victimGeo, vId], 2)
File "/root/trape/core/db.py", line 94, in sentences_victim
return self.sql_insert(self.prop_sentences_victim(type, data))
File "/root/trape/core/db.py", line 39, in sql_insert
self.cursor.execute(sentence)
OperationalError: near "Azur": syntax error

No victims are caught.

Basically, when I go to the url that you send to the victims I get nothing. Did I miss a installation step? Becuase I installed all the requirements and followed the simple installation steps and it does not launch. I'm on kali so maybe it doesn't work for kali? Wanted to try this thing out so bad lol.

No victims are caught - Kali Linux

TL;DR;
Requirements installed without issue.
Starts without error.
Port listens and responds.
Website seems half cloned and no victims are caught

sudo python trape.py -u https://www.google.com -p 80

When browsing the cloned website in every browser tested it looks half cloned and no victims are caught even when connecting from another machine still looks half cloned and no victims are caught.

Local browsers tested:
Chromium --disable-extensions #make sure no ad-blockers are enabled - enabled javascript and cookies
Firefox ESR - enabled javascript and cookies

Remote browsers tested:
Windows 10 - Edge - IE 11 - Chrome

Kali Linux Rolling fresh apt-get update && apt-get dist-upgrade.

python --version
Python 2.7.14+

sudo pip install -r requirements.txt
Requirement already satisfied: Flask==0.12.2 in /usr/lib/python2.7/dist-packages (from -r requirements.txt (line 1))
Requirement already satisfied: Flask-Login==0.4.0 in /usr/local/lib/python2.7/dist-packages (from -r requirements.txt (line 2))
Requirement already satisfied: Flask-Session==0.3.1 in /usr/local/lib/python2.7/dist-packages (from -r requirements.txt (line 3))
Requirement already satisfied: flask-socketio in /usr/local/lib/python2.7/dist-packages (from -r requirements.txt (line 4))
Requirement already satisfied: itsdangerous==0.24 in /usr/lib/python2.7/dist-packages (from -r requirements.txt (line 5))
Requirement already satisfied: Jinja2==2.7.3 in /usr/local/lib/python2.7/dist-packages (from -r requirements.txt (line 6))
Requirement already satisfied: MarkupSafe==0.23 in /usr/local/lib/python2.7/dist-packages (from -r requirements.txt (line 7))
Requirement already satisfied: python-engineio in /usr/local/lib/python2.7/dist-packages (from -r requirements.txt (line 8))
Requirement already satisfied: python-socketio in /usr/local/lib/python2.7/dist-packages (from -r requirements.txt (line 9))
Requirement already satisfied: six==1.9.0 in /usr/local/lib/python2.7/dist-packages (from -r requirements.txt (line 10))
Requirement already satisfied: Werkzeug==0.12.2 in /usr/local/lib/python2.7/dist-packages (from -r requirements.txt (line 11))
Requirement already satisfied: eventlet in /usr/local/lib/python2.7/dist-packages (from -r requirements.txt (line 12))
Requirement already satisfied: enum34; python_version < "3.4" in /usr/lib/python2.7/dist-packages (from eventlet->-r requirements.txt (line 12))
Requirement already satisfied: greenlet>=0.3 in /usr/lib/python2.7/dist-packages (from eventlet->-r requirements.txt (line 12))

PIP SHOW COMMANDS

sudo pip show flask
Name: Flask
Version: 0.12.2
Summary: A microframework based on Werkzeug, Jinja2 and good intentions
Home-page: http://github.com/pallets/flask/
Author: Armin Ronacher
Author-email: [email protected]
License: BSD
Location: /usr/lib/python2.7/dist-packages
Requires:

sudo pip show flask-login
Name: Flask-Login
Version: 0.4.0
Summary: User session management for Flask
Home-page: https://github.com/maxcountryman/flask-login
Author: Matthew Frazier
Author-email: [email protected]
License: MIT
Location: /usr/local/lib/python2.7/dist-packages
Requires: Flask

sudo pip show flask-session
Name: Flask-Session
Version: 0.3.1
Summary: Adds server-side session support to your Flask application
Home-page: https://github.com/fengsp/flask-session
Author: Shipeng Feng
Author-email: [email protected]
License: BSD
Location: /usr/local/lib/python2.7/dist-packages
Requires: Flask

sudo pip show flask-socketio
Name: Flask-SocketIO
Version: 2.9.6
Summary: Socket.IO integration for Flask applications
Home-page: http://github.com/miguelgrinberg/Flask-SocketIO/
Author: Miguel Grinberg
Author-email: [email protected]
License: MIT
Location: /usr/local/lib/python2.7/dist-packages
Requires: python-socketio, Flask

sudo pip show itsdangerous
Name: itsdangerous
Version: 0.24
Summary: Various helpers to pass trusted data to untrusted environments and back.
Home-page: http://github.com/mitsuhiko/itsdangerous
Author: Armin Ronacher
Author-email: [email protected]
License: UNKNOWN
Location: /usr/lib/python2.7/dist-packages
Requires:

sudo pip show jinja2
Name: Jinja2
Version: 2.7.3
Summary: A small but fast and easy to use stand-alone template engine written in pure python.
Home-page: http://jinja.pocoo.org/
Author: Armin Ronacher
Author-email: [email protected]
License: BSD
Location: /usr/local/lib/python2.7/dist-packages
Requires: markupsafe

sudo pip show markupsafe
Name: MarkupSafe
Version: 0.23
Summary: Implements a XML/HTML/XHTML Markup safe string for Python
Home-page: http://github.com/mitsuhiko/markupsafe
Author: Armin Ronacher
Author-email: [email protected]
License: BSD
Location: /usr/local/lib/python2.7/dist-packages
Requires:

sudo pip show python-engineio
Name: python-engineio
Version: 2.0.4
Summary: Engine.IO server
Home-page: http://github.com/miguelgrinberg/python-engineio/
Author: Miguel Grinberg
Author-email: [email protected]
License: MIT
Location: /usr/local/lib/python2.7/dist-packages
Requires: six

sudo pip show python-socketio
Name: python-socketio
Version: 1.9.0
Summary: Socket.IO server
Home-page: http://github.com/miguelgrinberg/python-socketio/
Author: Miguel Grinberg
Author-email: [email protected]
License: MIT
Location: /usr/local/lib/python2.7/dist-packages
Requires: six, python-engineio

sudo pip show six
Name: six
Version: 1.9.0
Summary: Python 2 and 3 compatibility utilities
Home-page: http://pypi.python.org/pypi/six/
Author: Benjamin Peterson
Author-email: [email protected]
License: MIT
Location: /usr/local/lib/python2.7/dist-packages
Requires:

sudo pip show werkzeug
Name: Werkzeug
Version: 0.12.2
Summary: The Swiss Army knife of Python web development
Home-page: http://werkzeug.pocoo.org/
Author: Armin Ronacher
Author-email: [email protected]
License: BSD
Location: /usr/local/lib/python2.7/dist-packages
Requires:

sudo pip show eventlet
Name: eventlet
Version: 0.22.1
Summary: Highly concurrent networking library
Home-page: http://eventlet.net
Author: Linden Lab
Author-email: [email protected]
License: UNKNOWN
Location: /usr/local/lib/python2.7/dist-packages
Requires: enum34, greenlet

sudo pip show enum34
Name: enum34
Version: 1.1.6
Summary: Python 3.4 Enum backported to 3.3, 3.2, 3.1, 2.7, 2.6, 2.5, and 2.4
Home-page: https://bitbucket.org/stoneleaf/enum34
Author: Ethan Furman
Author-email: [email protected]
License: BSD License
Location: /usr/lib/python2.7/dist-packages
Requires:

sudo pip show greenlet
Name: greenlet
Version: 0.4.12
Summary: Lightweight in-process concurrent programming
Home-page: https://github.com/python-greenlet/greenlet
Author: Alexey Borzenkov
Author-email: [email protected]
License: MIT License
Location: /usr/lib/python2.7/dist-packages
Requires:

I could be completely off here but im wondering if the backported enum34 has anything to do with it..
If someone can list versions of working python packages I can setup a virtual env for testing.

Let me know if I can provide any more information to help troubleshoot the issue.

ERROR in app

kali linux-2018-02-08-21-59-38

ya insatale los requerimientos pero aun asi no jala, que procede?

Lure URL not accessible

Installation was fine and without error. When I run python trape.py --url https://www.example.com --port 8080 I am able to access the Control Panel login but I am not able to browse the Lure URL. I have tested locally and there are no firewall issues. Confirmed that the process is listening on port 8080. Any advice as to why this isn't working?

trape send file does not work

File located: trape/static/files/file.exe

[ file.exe | SEND > ]

Does not seem to work.

trape host: Ubuntu Server
Client browser: Google Chrome 61.0.3163.100 & Mozilla Firefox 51.0.1

Not a issue but a question!

It's a really nice script, it work perfectly.
But I have a question, is it possible over WAN?
And how did you make the python script functioning just by using the web-based GUI?
I am interested in GUI, can you recommend me a tutorial of how I build it?
You may close this.

ERROR: Command '['unzip', 'ngrok.zip']'

Loading trape...

  • What is your port to generate the server? :~> 915

  • Successful startup, get lucky on the way!

warning [ngrok.zip]: 18777 extra bytes at beginning or within zipfile
(attempting to process anyway)
file #1: bad zipfile offset (local header sig): 18777
(attempting to re-compensate)

error: invalid compressed data to inflate
bad CRC 00000000 (should be f0876332)
[x] ERROR: Command '['unzip', 'ngrok.zip']' returned non-zero exit status 2

not working

Good day guys. i setup everything on my ubuntu linux vps sever. and ran command pythone trape.py - u url -p port 443. now everything started smoothly . i login to control panel. now when i visit victim link on my pc, it doesn't capture anything. the log is empty.Thanks

Python error?

Amazing tool!
Any idea why this is happening?

Traceback (most recent call last):
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1982, in wsgi_app
response = self.full_dispatch_request()
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1614, in full_dispatch_request
rv = self.handle_user_exception(e)
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1517, in handle_user_exception
reraise(exc_type, exc_value, tb)
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1612, in full_dispatch_request
rv = self.dispatch_request()
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1598, in dispatch_request
return self.view_functionsrule.endpoint
File "/root/trape/core/victim.py", line 87, in redirectVictim
html = victim_inject_code(opener.open(url).read(), 'vscript')
File "/usr/lib/python2.7/urllib2.py", line 421, in open
protocol = req.get_type()
File "/usr/lib/python2.7/urllib2.py", line 283, in get_type
raise ValueError, "unknown url type: %s" % self.__original
ValueError: unknown url type: twitter.com

Suggested Fixes and Bugs

I don't think Trape is rendering the target url web pages properly. I've tried several public web pages and they just don't show properly. Others seem to have mentioned this fact before.

Observations that are either bugs or potential improvements.

Bugs:

  • For example purposes, using google.com as the target, the images on the page don't show properly. This behaviour makes it seem like it's not the original target page. It's not just google.com. Any target web page I tried does not show properly. I use firefox and chrome on Linux. Same behaviour on each browser.

  • When trying to close or leave the target page, a message in the browser comes up about "keeping changes" or staying on the page? Very strange behaviour.

Fixes:

  • Most targets would be tipped off to the strange looking url showing in the browser window as it's not the standard/normal site url. When I first saw Trape, I expected the url in the browser to show like the original page. It doesn't. There needs to be some url cloaking or aliasing built in to enable the visible url to appear more authentic.

  • The trape tool should integrate ngrok and serveo. Similar to how it's done with Shellfish or the previous WAN capable version of Blackeye

Hope this feedback helps improve the functionality of the product. Right now, it seems to be broken. Not really usable. It's got a lot of promise and is much needed for security testing and research.

Some bugs

Hola, corriendo trape desde window vm con ubuntu, accediendo al GUI de trape desde window
la resolución de IP es incorrecta, no debería tomar el local host sino la IP del host.
En la segunda imagen, se notan resuelve de forma incorrecta las absolute paths de archivos estáticos de google.

Saludos

error trape 0
error trape 1

500 Internal Server Error

Linux Version >/Linux Galaxy 4.17.0-kali1-amd64 #1 SMP Debian 4.17.8-1kali1 (2018-07-24) x86_64 GNU/Linux
Python Version >/Python 2.7.15
Pip Version > /pip 9.0.1 from /usr/lib/python2.7/dist-packages (python 2.7)
Error >/
Traceback (most recent call last): File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1982, in wsgi_app response = self.full_dispatch_request() File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1614, in full_dispatch_request rv = self.handle_user_exception(e) File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1517, in handle_user_exception reraise(exc_type, exc_value, tb) File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1612, in full_dispatch_request rv = self.dispatch_request() File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1598, in dispatch_request return self.view_functions[rule.endpoint](**req.view_args) File "/root/Desktop/trape/core/victim.py", line 96, in redirectVictim html = victim_inject_code(opener.open(url).read(), 'vscript') File "/usr/lib/python2.7/urllib2.py", line 421, in open protocol = req.get_type() File "/usr/lib/python2.7/urllib2.py", line 283, in get_type raise ValueError, "unknown url type: %s" % self.__original ValueError: unknown url type: www.facebook.com [2018-09-19 11:49:48,855] ERROR in app: Exception on /redv [GET]

OSError

Unfortunately, I get this:

OSError: [Errno 1] Operation not permitted: '/var/folders/xv/57736fs93jlgj5pqq5qgwxpw0000gn/T/pip-F4NCOp-uninstall/System/Library/Frameworks/Python.framework/Versions/2.7/Extras/lib/python/six-1.4.1-py2.7.egg-info'

Thanks for any tip

How About using SSL ?

Is there a way to use it with ssl certs ?
so the website is not showing unsecured connection ?

ERROR in app: Exception on /rl [GET]

Hi!

I have some problems with Trape in Linux, is a bug?

Python Version: Python 2.7.14 (default, Sep 20 2017, 01:25:59).

python2 trape.py -url https://www.google.com -p 80

...
	+--=[ Lure for the victims: http://127.0.0.1:80/rl
	+--=[ Control Panel Link: http://127.0.0.1:80/s34d7e7
	+--=[ Your Access key: 4eb9fb76ae4b4f40f3946671


[>] Start time: 2017-11-07 - 20:20:57
[¡] Waiting for the victims to fall...

[2017-11-07 20:21:14,190] ERROR in app: Exception on /rl [GET]
Traceback (most recent call last):
  File "/usr/lib/python2.7/site-packages/flask/app.py", line 1982, in wsgi_app
    response = self.full_dispatch_request()
  File "/usr/lib/python2.7/site-packages/flask/app.py", line 1614, in full_dispatch_request
    rv = self.handle_user_exception(e)
  File "/usr/lib/python2.7/site-packages/flask/app.py", line 1517, in handle_user_exception
    reraise(exc_type, exc_value, tb)
  File "/usr/lib/python2.7/site-packages/flask/app.py", line 1612, in full_dispatch_request
    rv = self.dispatch_request()
  File "/usr/lib/python2.7/site-packages/flask/app.py", line 1598, in dispatch_request
    return self.view_functions[rule.endpoint](**req.view_args)
  File "/home/busi/trape/core/victim.py", line 34, in homeVictim
    html = victim_inject_code(opener.open(trape.url_to_clone).read(), 'lure')
  File "/usr/lib/python2.7/urllib2.py", line 421, in open
    protocol = req.get_type()
  File "/usr/lib/python2.7/urllib2.py", line 283, in get_type
    raise ValueError, "unknown url type: %s" % self.__original
ValueError: unknown url type: rl
 pip2 install -r requirements.txt 
Requirement already satisfied: Flask==0.12.2 in /usr/lib/python2.7/site-packages (from -r requirements.txt (line 1))
Collecting Flask-Login==0.4.0 (from -r requirements.txt (line 2))
  Using cached Flask_Login-0.4.0-py2.py3-none-any.whl
Collecting Flask-Session==0.3.1 (from -r requirements.txt (line 3))
  Using cached Flask_Session-0.3.1-py2.py3-none-any.whl
Requirement already satisfied: Flask_SocketIO in /usr/lib/python2.7/site-packages (from -r requirements.txt (line 4))
Requirement already satisfied: itsdangerous==0.24 in /usr/lib/python2.7/site-packages (from -r requirements.txt (line 5))
Collecting Jinja2==2.7.3 (from -r requirements.txt (line 6))
  Using cached Jinja2-2.7.3.tar.gz
Collecting MarkupSafe==0.23 (from -r requirements.txt (line 7))
  Using cached MarkupSafe-0.23.tar.gz
Requirement already satisfied: python-engineio in /usr/lib/python2.7/site-packages (from -r requirements.txt (line 8))
Requirement already satisfied: python-socketio in /usr/lib/python2.7/site-packages (from -r requirements.txt (line 9))
Collecting six==1.9.0 (from -r requirements.txt (line 10))
  Using cached six-1.9.0-py2.py3-none-any.whl
Collecting Werkzeug==0.12.2 (from -r requirements.txt (line 11))
  Using cached Werkzeug-0.12.2-py2.py3-none-any.whl
Requirement already satisfied: click>=2.0 in /usr/lib/python2.7/site-packages (from Flask==0.12.2->-r requirements.txt (line 1))
Installing collected packages: Flask-Login, Flask-Session, MarkupSafe, Jinja2, six, Werkzeug
  Found existing installation: MarkupSafe 1.0
    Uninstalling MarkupSafe-1.0:
      Successfully uninstalled MarkupSafe-1.0
  Running setup.py install for MarkupSafe ... done
  Found existing installation: Jinja2 2.9.6
    Uninstalling Jinja2-2.9.6:
      Successfully uninstalled Jinja2-2.9.6
  Running setup.py install for Jinja2 ... done
  Found existing installation: six 1.11.0
    Uninstalling six-1.11.0:
      Successfully uninstalled six-1.11.0
  Found existing installation: Werkzeug 0.12.2.dev0
    Uninstalling Werkzeug-0.12.2.dev0:
      Successfully uninstalled Werkzeug-0.12.2.dev0
Successfully installed Flask-Login-0.4.0 Flask-Session-0.3.1 Jinja2-2.7.3 MarkupSafe-0.23 Werkzeug-0.12.2 six-1.9.0

Regards!

sh: cls: command not found

I am getting this following error while running the trape.py on MAC OS

sh: cls: command not found
Currently there is no support for Windows.
--------------------
> Welcome to trape <
--------------------
[*] Hello MacBook-Pro.local, I hope you enjoy my role
[x] You must run in mode root to be able to operate.

Any ideas, what could be wrong.

cannot track redirect

so i have set google as an attack perimeter and while i access the google link from there in the search bar when i type any website the error pops
that do you want to leave or stay nothing else

Command Not Working

OS - Parrot os
Version - Latest

Command are not working! --------> please have look this issue and advise.

[>] Start time: 2018-01-29 - 20:37:18
[¡] Waiting for the victims to fall...

[] A victim has been connected from XX.34.50.1X2 with the following identifier: 89cf9
[
] It's his first time
[@] Open url phishing in 1cfVC9
[@] Open url phishing https://www.facebook.com in 1cC69
[@] Open url phishing https://www.facebook.com in 1cf69
[@] Sending alert hi in 1cf69
[@] Sending alert hi in 1cf69
[@] Open url phishing www.google.com in 1cf69

trape showing issue

[2018-10-03 11:14:38,961] ERROR in app: Exception on /rl [GET]
Traceback (most recent call last):
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1982, in wsgi_app
response = self.full_dispatch_request()
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1614, in full_dispatch_request
rv = self.handle_user_exception(e)
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1517, in handle_user_exception
reraise(exc_type, exc_value, tb)
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1612, in full_dispatch_request
rv = self.dispatch_request()
File "/usr/local/lib/python2.7/dist-packages/flask/app.py", line 1598, in dispatch_request
return self.view_functionsrule.endpoint
File "/root/trape/core/victim.py", line 36, in homeVictim
html = victim_inject_code(opener.open(trape.url_to_clone).read(), 'lure')
File "/usr/lib/python2.7/urllib2.py", line 421, in open
protocol = req.get_type()
File "/usr/lib/python2.7/urllib2.py", line 283, in get_type
raise ValueError, "unknown url type: %s" % self.__original
ValueError: unknown url type: rl

Error: No module named flask

Hi guys, I've installed trape and all dependencies through pip install -r dependencies.txt, but when I run python trape -u www.example.com -p 80 it gaves me this message "Error: No module named flask", So I have no idea which is the problem. Thanks in advance for your help.

Descarga de Recursos

Trape a mi parecer deberia descargar todos los recursos estaticos necesarios para que la página se muestre correctamente.

Voy a hacer el ajuste y te lo envio.

¿Cuál es la versión más estable de python para trabajar en windows y Mac OS?

Instale la version 3.7, pero me marca unos errores de codigo en el archivo utils.py, específicamente que la función print ahora debe ir entre paréntesis, le he agregado los paréntesis y posteriormente me da error en db.py con el mensaje de que hay inconsistencia en las tabulaciones(indentación y/o espacios) del código.

Trape isn't working with Chromium version 62

Description
I do

python trape.py -u https://google.com -p 8080

Then I got,
image

I tried to browse http://127.0.0.1:8080/google.com in Chromium V.62, but there is no logs or victims in the cPanal However, When I used the same URL in Firefox, I got logs and I can see the victim in the cPanal.

OS
ubuntu 16.04

Browser
Version 62.0.3202.62 (Official Build) Built on Ubuntu , running on Ubuntu 16.04 (64-bit)

Error when browse the Lure and Control linl

[2018-03-24 20:24:33,029] ERROR in app: Exception on /get_title [POST]
Traceback (most recent call last):
File "C:\Python27\lib\site-packages\flask\app.py", line 1982, in wsgi_app
response = self.full_dispatch_request()
File "C:\Python27\lib\site-packages\flask\app.py", line 1614, in full_dispatch_request
rv = self.handle_user_exception(e)
File "C:\Python27\lib\site-packages\flask\app.py", line 1517, in handle_user_exception
reraise(exc_type, exc_value, tb)
File "C:\Python27\lib\site-packages\flask\app.py", line 1612, in full_dispatch_request
rv = self.dispatch_request()
File "C:\Python27\lib\site-packages\flask\app.py", line 1598, in dispatch_request
return self.view_functionsrule.endpoint
File "D:\python_codes\trape-master\trape-master\core\stats.py", line 71, in home_get_title
html = opener.open(trape.url_to_clone).read()
File "C:\Python27\lib\urllib2.py", line 421, in open
protocol = req.get_type()
File "C:\Python27\lib\urllib2.py", line 283, in get_type
raise ValueError, "unknown url type: %s" % self.__original
ValueError: unknown url type: www.facebook.com

trape malfunction

Even when i got lured the victim and i see his details in information, when i clict the online facebook session button it doesnt do anything, also it doesnt redirect browser, or send alerts or phishing, everything is installed and update im running Kali GNU/Linux Rolling 64bits
Thanks in advance for this great tool

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.