maemo.org - Talk

maemo.org - Talk (https://talk.maemo.org/index.php)
-   Applications (https://talk.maemo.org/forumdisplay.php?f=41)
-   -   [Announce] Yet another MITM attack script (Yamas-ARM) (https://talk.maemo.org/showthread.php?t=73988)

Creamy Goodness 2011-06-20 16:26

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by vi_ (Post 1032611)
This will never make it to the repositorys...it is just a script.

The version torpedo and I worked on addresses all the issues that have been raised about running this thing on the n900.

You will be unable to include the changes into your 'master' version 'upstream' as It has not really been written in a 'portable' fashion.

As far as I am concerned the version I have 'fixed' as linked to in the other thread is the only version worth even attempting to run on an n900. The version in this thread is plain broken and was untested on release.

Concerning future development, that is all up to you bromaX. I have 'scratched my itch', created a working version. I have even provided a paste n' script psuedo installer. What you guys now do with this is up to you.

Despite the fact this makes stealing secured passwords so easy my mother could do it some people are still managing to ****itup. This fact concerns me. This script is the equivalent of giving an AK47 to a mal-balanced child. (but there again, i feel guilty when using aircrack. Do I understand the weakness in the WEP implementation of the RC4 cipher enough to feel legitimate enough to use aircrack? - where TF am I going with this??)

tl;dr; I have nothing more to contribute to YAMAS. My pastebin link will expire in 28 days. This version sucks, use the one in the other thread. Don't actually ever use this script, if you do it is nothing to do with me.

Dude the version he wrote originally is not perfect, but it DOES WORK, please don't say that it "sucks". If I come over to your house for dinner and I think the food could use some more salt or hot sauce, do I tell you that it sucks? Try to be nice to people that aren't getting paid to take abuse... We don't want to scare away all the developers!
Also, thanks for both of your work so far, I trust you can combine this into one script without arguing about it too much :)

Unhuman 2011-06-20 16:28

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by vi_ (Post 1032815)
2. The version posted here ITT is broken for the N900 when first posted and is still broken for the N900. This is NO reflection upon the quality of the original which runs perfectly fine on a 'normal' linux computer.

Really? As it works flawlessly on my phone and a few others that have reported that here, on private and on my blog. Though you indeed created a BORKEN version of it by ****ing up the parsing method and removing the ability of remotely updating the grep process.

I still don't like your tone.


@stevomanu - the only difference between this version and the previous is the place the log of sslstrip is saved. I just moved it from /tmp/ to /home/user/MyDocs/Yamas. It doesn't make sense not to work.

The only thing I can think you can try is manually creating /home/user/MyDocs/Yamas directory and trying again.

Cheers

EDIT: Yep pretty sure its that now -.- Uploaded a version without a mkdir /home/user/MyDocs/Yamas command -_- Will have it fixed asap - until then create the directory manually.

Estel 2011-06-20 21:33

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
0_o Another little flame war due to vi_ sociopathic behavior... Yea, thats REALLY what i hoped in this thread, FFS...

Flamewars aside, moving to concrete things - i don't see any reasons why it shouldn't make it way into repos IF it's technically possible to pack it into .deb file. Every program is "just a script", to some degree ;) If no one care (except comaX who definitely care, but he don't have N900) to move *** and try, I'll talk with Mentalist about his recent experiences with maintaining packages and maybe I'll be able to do it. Still as i said only if it's technically possible.

I hate when such a good things are scattered around many parts of forum. In case of reflash/whatever You must remember #@$# dozen of places outside repos, where You can find things You've used.

/Estel

//Edit

Backupmenu is also JUST A SCRIPT, but it sit in repos happily.

comaX 2011-06-21 09:46

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Estel (Post 1033362)
0_o Another little flame war due to vi_ sociopathic behavior... Yea, thats REALLY what i hoped in this thread, FFS...

Flamewars aside, moving to concrete things - i don't see any reasons why it shouldn't make it way into repos IF it's technically possible to pack it into .deb file. Every program is "just a script", to some degree ;) If no one care (except comaX who definitely care, but he don't have N900) to move *** and try, I'll talk with Mentalist about his recent experiences with maintaining packages and maybe I'll be able to do it. Still as i said only if it's technically possible.

I hate when such a good things are scattered around many parts of forum. In case of reflash/whatever You must remember #@$# dozen of places outside repos, where You can find things You've used.

/Estel

//Edit

Backupmenu is also JUST A SCRIPT, but it sit in repos happily.

About places to remember, you shouldn't have to remember much. I deleted the auto-updating feature in this version, but when it will be stable enough, I'll think about an argument to pass to the script so that it updates itself ;)

I don't believe this script would make it any near any repo, but if it does, I would just be really glad ^^

If you guys want to do it, be my guests !

As I have time this afternoon, I should make quite some updates !

torpedo48 2011-06-22 11:36

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
If someone still has doubts about what this script is and what it does, I've made a video showing YAMAS in action:

http://www.youtube.com/watch?v=9bSq7tXSGAo

PS: vi_ is right, this script is like putting an AK-47 in a child's hand :)

stevomanu 2011-06-22 13:51

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by torpedo48 (Post 1035816)
If someone still has doubts about what this script is and what it does, I've made a video showing YAMAS in action:

http://www.youtube.com/watch?v=9bSq7tXSGAo

PS: vi_ is right, this script is like putting an AK-47 in a child's hand :)

nice video glad to see its working for some , im having no luck it was working perfect but sinch updating script things have gone pair shaped ..

comaX 2011-06-22 13:53

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by torpedo48 (Post 1035816)
If someone still has doubts about what this script is and what it does, I've made a video showing YAMAS in action:

http://www.youtube.com/watch?v=9bSq7tXSGAo

PS: vi_ is right, this script is like putting an AK-47 in a child's hand :)

Nice video ! I wish I could make one that good for the original one !

torpedo48 2011-06-22 13:54

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by stevomanu (Post 1035945)
nice video glad to see its working for some , im having no luck it was working perfect but sinch updating script things have gone pair shaped ..

You can always download the original script and install the additional required dependences, like xterm, and it should be perfectly working!

torpedo48 2011-06-22 14:01

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by comaX (Post 1035948)
Nice video ! I wish I could make one that good for the original one !

Unfortunately I can't afford a notebook (yet), so I'm using BackTrack on a virtual machine on my Windsucks 7 PC; unfortunately wifi isn't working properly and I'm not able to use your original script there, or I'd make a good video for you!

I promise to make it as soon as I'll buy a notebook ;)

stevomanu 2011-06-22 14:31

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by torpedo48 (Post 1035950)
You can always download the original script and install the additional required dependences, like xterm, and it should be perfectly working!

were is the orignal script then please ??

torpedo48 2011-06-22 17:00

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by stevomanu (Post 1035985)
were is the orignal script then please ??

I published this link in the description of my video, but here it is:

http://pcsci3nce.info/?p=291

Unhuman 2011-06-22 17:14

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Any chance that I can use the video on the official post on my blog ? :>

comaX 2011-06-22 17:14

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by torpedo48 (Post 1035961)
Unfortunately I can't afford a notebook (yet), so I'm using BackTrack on a virtual machine on my Windsucks 7 PC; unfortunately wifi isn't working properly and I'm not able to use your original script there, or I'd make a good video for you!

I promise to make it as soon as I'll buy a notebook ;)

You sir, are a real gentleman !

torpedo48 2011-06-22 17:28

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Unhuman (Post 1036150)
Any chance that I can use the video on the official post on my blog ? :>

Mmmmhh you mean mine (can't understand what "official post" means in this context, as there are no videos in the OP)?

If you mean my video: sure, use it as you like, I'd be honoured. The Youtube sharing code is here.

If you write a little note sounding like "thanks to torpedo48 for the video" I'd be very happy too, but it doesn't really matter.

<advertisement>I can create any kind of video for anybody (within the limits of my knowledge of course), just ask ;) </advertisement>

comaX 2011-06-22 17:35

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by torpedo48 (Post 1036158)
If you mean my video: sure, use it as you like, I'd be honoured. The Youtube sharing code is here.

"A LINK TO A COMPLETE GUIDE FOR YAMAS WILL BE PUBLISHED SOON"

By the way, what do you mean by a complete guide to yamas ?
Whatever this is, if you need anything, just ask ;)

(by the way, nice song you got on the screenshot in your real multitasking thread \m/ )

torpedo48 2011-06-22 17:44

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by comaX (Post 1036164)
By the way, what do you mean by a complete guide to yamas ?
Whatever this is, if you need anything, just ask ;)

Thanks a lot for your disposability! I mean a simple step-to-step noob-proof guide for obtaining the script (a working version of course), correctly installing all the necessary dependences and running it without errors. I know that's a dumb guide, but I'm receiving many PMs requesting this kind of things.

And, between ourselves, I write those articles as reminders for me, so that I can write down some notes and learn better (cause as you've already understood, I'm just an undercover noob who desperately wants to increase his knowledge).

comaX 2011-06-24 16:06

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
HI guys ! So, I've done some little updates, nothing too fancy though.
It now checks for the installed dependencies, and if you are root.
I would need you to test it, and report back. Usual stuff, you know :p
Those should work.

We are now working on being able lo launch it only by typing the name of the script, and not "bash yamas.sh". What I think should be done is change the first line of the script to where ash is installed.
Another thing I have in mind is to ask for installation of missing dependencies : instead of failure it would say something like "Herpderp is missing. Do you want to install it (Y/n)"
Yes --> installs.
No --> Quits.

That last part is not sure though. I'll stay on the basics for now, but let's say I'm thinking about it.

Waiting for feedback and all, I'll try to work on the Standard edition (check BT forums if interested). DNS spoofing should be on the way ! Maybe an easter egg too, if ever I have the time =D

Estel 2011-06-24 16:17

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by comaX (Post 1038191)
HI guys ! So, I've done some little u
We are now working on being able lo launch it only by typing the name of the script, and not "bash yamas.sh". What I think should be done is change the first line of the script to where ash is installed.

We got function like that incorporated in N900. If we place any .sh script into:

Code:

/usr/bin/
...and make it executable (for example test.sh), we can run that script just by executing:

test.sh

on our osso-xterm. So i think you don't need to worry about that.

comaX 2011-06-24 17:53

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Estel (Post 1038200)
We got function like that incorporated in N900. If we place any .sh script into:

Code:

/usr/bin/
...and make it executable (for example test.sh), we can run that script just by executing:

test.sh

on our osso-xterm. So i think you don't need to worry about that.

Yup, I know, that's the same in every linux (afaik) and I use it in my original script. The thing here is that you have to tell the term how to "read" the script by launching it with "bash" before. But what I would want is to get rid of that, so that it launches with only /path/scipt.sh. That should be achieved by writing #! /bin/ash on the first line of the script.
It would then use the default ash of maemo (so, no need to install bash), and you wouldn't have to launch it with "ash script.sh".
So far results are inconclusive though, because I can't test directly (not that Unhuman's tests are bad, but I always forget to tell him things, so it's better if I trial and fail on my own ^^).
But if someone understood what I mean and achieves that, that would be very nice :)

Chrome 2011-06-24 17:57

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by comaX (Post 1038191)
DNS spoofing should be on the way ! Maybe an easter egg too, if ever I have the time =D

Good news, if you need a tester for the new scripts I'll gladly help.

Unhuman 2011-06-24 18:13

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
From I got from comaX today is that the script should be completely functional with ash now ( so no need for bash ). However when I run it with ash I get errors in the new dependency part of the script:
ash: unknown operand

and gives a false positive for missing dependencies (no such thing happens when run as bash)

Moreover, after using chmod +x on it the script still returns permission denied when run as ./mitm_pcsci3nce.sh.

I will try putting the script in /usr/bin now and running it directly and see what happens.


EDIT:

This works. Script can be started after chmod +x in /usr/bin by simply issuing mitm_pcsci3nce.sh in terminal. However, it still returns:
ash: unknown operand
and claims I have unmet dependencies (despite all showing success)

EDIT 2:

So until figuring out why this happens with ash, bash will still be required. ( first line of the script should link to /bin/bash, not bin/ash)

comaX 2011-06-24 18:34

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Chrome (Post 1038270)
Good news, if you need a tester for the new scripts I'll gladly help.

That's noted, thanks !

I must warn you guys though : I'm moving out this week, so I should be pretty busy, and when in my new apartment, I might not have internet for some time :s (or Edge connection from mobile phone... Yepee !)
I'll kindly ask the neighbors, but I don't think they'll just let me connect to their network like that.

#####

Quote:

Originally Posted by Unhuman (Post 1038279)
From I got from comaX today is that the script should be completely functional with ash now [...]
So until figuring out why this happens with ash, bash will still be required. ( first line of the script should link to /bin/bash, not bin/ash)

Yup, yup, yup ! We'll try some more, but if it's too much of a hassle, we'll stick to bash. After all it's not heavy or anything, and I believe is the most spread version of sh !

If you guys find a way to use ash though, we'll be happy bunnies =)

Unhuman 2011-06-25 08:55

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
New version with dependency check added - test if it works .

It still requires bash to be run, however it can now be run as
mitm_pcsci3nce.sh only, no need to type bash before the name now.

Saturn 2011-06-25 09:21

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Unhuman (Post 1038642)
New version with dependency check added - test if it works .

It still requires bash to be run, however it can now be run as
mitm_pcsci3nce.sh only, no need to type bash before the name now.

Hi, the check would be best done by using dpkg; e.g. for wget

Code:

if dpkg -l | grep wget 1>/dev/null; then echo $?;fi

stevomanu 2011-06-25 09:58

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
finally got this working after reinstalling every thing all is working fine one thing i noticed i was sniffing on phone an was using pc an if i click on facebook it goes to white page with

Code:

location: ht
if i refresh page it works but surly some1 would realiz someting was wrong ..

thanks for all work on script to all involved

Chrome 2011-06-25 10:06

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Unhuman (Post 1038642)
New version with dependency check added - test if it works .

It still requires bash to be run, however it can now be run as
mitm_pcsci3nce.sh only, no need to type bash before the name now.

Placed it in /usr/bin and give it permissions. It does run using "mitm_pcsci3nce.sh"

Works like a charm and checks for deps on start up, but why not use osso-xterm and ash like vi_ did?

comaX 2011-06-25 10:30

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Saturn (Post 1038647)
Hi, the check would be best done by using dpkg; e.g. for wget

Code:

if dpkg -l | grep wget 1>/dev/null; then echo $?;fi

I didn't think about that, but I think just checking for a file to exist is simpler than calling two other programs, however light they are. That's a good idea though.

####

Quote:

Originally Posted by Chrome (Post 1038679)
Placed it in /usr/bin and give it permissions. It does run using "mitm_pcsci3nce.sh"

Works like a charm and checks for deps on start up, but why not use osso-xterm and ash like vi_ did?

Osso-xterm seems to be a pain in the *** to use ! But if we find a way to use it, it will be used. That's not a priority though, since xterm is pretty light and is the most used script-wise. As for ash, that's just plain weird. It should be working but when Unhuman tested it, it failed.

What would be nice is for you guys to test with ash on your own, either with :
- ash script.sh
- script.sh, with the first line of the script being #! /bin/ash
And then report back, either here, or by mail.

####


Quote:

Originally Posted by stevomanu (Post 1038669)
finally got this working after reinstalling every thing all is working fine one thing i noticed i was sniffing on phone an was using pc an if i click on facebook it goes to white page with

Code:

location: ht
if i refresh page it works but surly some1 would realiz someting was wrong ..

thanks for all work on script to all involved

That comes from sslstrip 0.9, and there's nothing we can do about it, unfortunately. But the script is not at fault here !

bass800 2011-06-25 11:00

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
the script has failed to find ettercap but on its own ettercap works. I installed ettercap via karma's debz from link below. how can i correct this?

http://talk.maemo.org/showthread.php...cking+tutorial

Quote:


cd /home/user/MyDocs/karam
mv ettercap-ng.tar.gz /opt
cd /opt
tar xzvf ettercap-ng.tar.gz
chmod +rwx -R ettercap/
rm ettercap-ng.tar.gz
cd # maybe not required
ln -s /opt/ettercap/lib/libnet.so.1.3.0 /usr/lib/libnet.so.1
ln -s /opt/ettercap/bin/ettercap /usr/bin
ln -s /opt/ettercap/bin/etterfilter /usr/bin
ln -s /opt/ettercap/bin/etterlog /usr/bin


Chrome 2011-06-25 11:05

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by comaX (Post 1038697)
What would be nice is for you guys to test with ash on your own, either with :
- ash script.sh
- script.sh, with the first line of the script being #! /bin/ash
And then report back, either here, or by mail.

Works fine with ash actually, but it shows this error after "You can discover hosts and enter IP(s) manually by entering D

Code:

ash: D: unknown operand

stevomanu 2011-06-25 11:21

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by bass800 (Post 1038725)
the script has failed to find ettercap but on its own ettercap works. I installed ettercap via karma's debz from link below. how can i correct this?

http://talk.maemo.org/showthread.php...cking+tutorial

i had this issue an reinstalled ettercap from these instructions an now all is working fine

Code:


http://talk.maemo.org/showpost.php?p=852862&postcount=17

now all works mint

Saturn 2011-06-25 11:46

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Chrome (Post 1038729)
Works fine with ash actually, but it shows this error after "You can discover hosts and enter IP(s) manually by entering D

Code:

ash: D: unknown operand

Hi comaX,

to correct those errors you need for example in line 79:

Code:

if [[ $(grep "0" ./test.txt) == "" ]]; then
the following:
Code:

if [[ "$(grep "0" ./test.txt)" == "" ]]; then
that is "$(blabla)" type of thing.

You have this in many ifs but not everywhere and ash is strict about (bash can handle those).

bass800 2011-06-25 12:58

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by stevomanu (Post 1038741)
i had this issue an reinstalled ettercap from these instructions an now all is working fine

Code:


http://talk.maemo.org/showpost.php?p=852862&postcount=17

now all works mint

coolz, that worked. thanks.

stevomanu 2011-06-25 13:16

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by bass800 (Post 1038804)
coolz, that worked. thanks.

no problem any time , cant i suggest next time use THANKS button it saves on loads of thank you posts ..

Unhuman 2011-06-25 13:48

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
That is what happens when you have 5 different ettercap ports with 5 different places that it shits its files to... Can someone say where is ettercap placed from the karam installation?

EDIT:
Obviously if you are sure ettercap is installed ignore the dependency warning. Gotta update the script to search in multiple locations due to the explanation above.

comaX 2011-06-25 14:25

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Saturn (Post 1038764)
Hi comaX,

to correct those errors you need for example in line 79:

Code:

if [[ $(grep "0" ./test.txt) == "" ]]; then
the following:
Code:

if [[ "$(grep "0" ./test.txt)" == "" ]]; then
that is "$(blabla)" type of thing.

You have this in many ifs but not everywhere and ash is strict about (bash can handle those).

Yeah, I noticed ash is pretty strict ! But also pretty cool on some point, especially echo, for instance.
I'm working on all those operand errors, but as I said earlier, I'm in the middle of a moving out, so it might take some time !

Also, now that the dependencies check works in ash, I'll introduce looking for different paths ;)
How should the script react to a missing dependency ? Just a warning ? Exiting ?

badstraw 2011-06-25 14:33

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Do you guys know why am I getting :
Warning : Cannot convert string "nil2" to type Fontstruct

comaX 2011-06-25 15:01

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by badstraw (Post 1038865)
Do you guys know why am I getting :
Warning : Cannot convert string "nil2" to type Fontstruct

Just discard this error, it's just some font stuff. If you tell me the line the error comes at, I'll try to fix it !

Saturn 2011-06-25 15:35

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
1 Attachment(s)
Hi comaX and Unhuman,

I think this removes bash dependencies. Have added also tabs here and there for me to read it easier.

Hope you find it useful.

Note: Haven't tested it much.

Chrome 2011-06-25 16:03

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Saturn (Post 1038892)
Hi comaX and Unhuman,

I think this removes bash dependencies. Have added also tabs here and there for me to read it easier.

Hope you find it useful.

Note: Haven't tested it much.

Operand errors are gone now. I let it run for 5 minutes, and got no errors whatsoever.

On a side note: xterm really annoys me, font is small, and you can't copy directly from it :o

Edit: after 10 minutes of running device crashed and restarted. This never happened with the previous scripts.

comaX 2011-06-25 16:18

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Chrome (Post 1038909)
Operand errors are gone now. I let it run for 5 minutes, and got no errors whatsoever.

On a side note: xterm really annoys me, font is small, and you can't copy directly from it :o

Edit: after 10 minutes of running device crashed and restarted. This never happened with the previous scripts.

Nice to report on Saturn's version. On each echo line, is the argument printed ? Because I had to remove them all with my version of ash...
Xterm is a secondary problem dude, just copy from the .pass.txt for now ^^ I promise I'll try and make it through with osso when I have the time ;)

The fact that you device crash is not surprising ! The parsing method is very CPU-consuming (working on something about that, btw ; but I'm having a hard time !). What I can suggest is that you go to the RTP menu, and pause or kill the process for some time.

Could you provide me with screenshots of Saturn's version please ? That may help me a great lot !

Thanks to you both :)


All times are GMT. The time now is 16:32.

vBulletin® Version 3.8.8