maemo.org - Talk

maemo.org - Talk (https://talk.maemo.org/index.php)
-   Applications (https://talk.maemo.org/forumdisplay.php?f=41)
-   -   [Announce] Yet another MITM attack script (Yamas-ARM) (https://talk.maemo.org/showthread.php?t=73988)

stevomanu 2011-06-16 09:50

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Unhuman (Post 1030101)
"Noobs" shouldn't even use the script .. So in a way I actually think it is better that the installation is more complicated.

well ye they should at least try it remember noobs start somewere an if this script helps then i dont see why they cany use it ..

comaX 2011-06-16 10:06

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by vi_ (Post 1030048)
This script requires some serious work to make it ready for the n900. For example, why are you using xterm? It is a NEEDLESS dependancy, use osso-xterm instead (the built in one).

Why does it depend on BASH, why not modify it to be compliant with ash?

Why does it have to connect to the net to download extra scripts?

Why not just combine the two into a local version?

My first "bad" feedback, finally ! :P

So, as I posted earlier : i didn't know maemo before this thread existed and I do not own a N900. I just "ported" it according to what I was told.

" It is a NEEDLESS dependancy, use osso-xterm instead (the built in one)."
Fine ! you just had to say it, it shouldn't be to hard to do ! Could you please send me the part of code that should change accordingly ? (in case it's not just xterm that becomes osso-xterm of course)

"Why does it depend on BASH, why not modify it to be compliant with ash?"
Cause it was made for bash, duh. What should change for it to be ash compliant ? You input is welcomed !

There is no extra script needed, just a file I use to parse the logs. Think of it as a pseudo-definition file. The only point of this is that it allows me to update it as soon as I find something new, whitout the need for the end-user to check for updates. If you guys don't like it, I can put it back in, without downloads. But since you should use that on a (=YOUR/AUTHORIZED) network, you should have connectivity. What are 13 fcuking bits anyway? Could be handy for the --parse option, I must admit. But really, I think being connected isn't too much to ask !
If a majority of people don't like it, I'll reverse it back to a grep line !

Thanks for the feedback, that should help improve it ! But just try to cool it on the way you say it. I'm a student in law (read, nothing computer-related), doing it for fun, and for free ;)

Waiting for your input ;) Don't hesitate to mail me !

Cheers

##############

Quote:

Originally Posted by stevomanu (Post 1030114)
well ye they should at least try it remember noobs start somewere an if this script helps then i dont see why they cany use it ..

While I agree with unhuman, I agree with that too. Let me clarify : script kiddies should keep the hell away from it. Noobs should devour the source to learn what is going on.
As stated in the disclaimer (cf. source), this script is intended for learning purposes (both bash and network security). I believe I wrote the needed comments in it for anyone to understand what's going on !

##############


Quote:

Originally Posted by Creamy Goodness (Post 1029970)
Thx for the help :/
srsly, game 7
too many targets :O

-edit-

well FYI it didn't work when I was connected to "free wi-fi" in a place with probably 300 ppl. Does that mean the router has a firewall blocking something this needs to do? I don't know what exactly it's scanning for.
I tried it at home and it works, detects more hosts...

Yup, several subnets are used on those stuff, so you might not be able to scan others subnets, and the AP might be blocking our probes. To know if there are client connected to the AP, check with airodump ;)

vi_ 2011-06-16 10:25

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by comaX (Post 1030118)
My first "bad" feedback, finally ! :P

So, as I posted earlier : i didn't know maemo before this thread existed and I do not own a N900. I just "ported" it according to what I was told.

" It is a NEEDLESS dependancy, use osso-xterm instead (the built in one)."
Fine ! you just had to say it, it shouldn't be to hard to do ! Could you please send me the part of code that should change accordingly ? (in case it's not just xterm that becomes osso-xterm of course)

"Why does it depend on BASH, why not modify it to be compliant with ash?"
Cause it was made for bash, duh. What should change for it to be ash compliant ? You input is welcomed !

There is no extra script needed, just a file I use to parse the logs. Think of it as a pseudo-definition file. The only point of this is that it allows me to update it as soon as I find something new, whitout the need for the end-user to check for updates. If you guys don't like it, I can put it back in, without downloads. But since you should use that on network, you should have connectivity. What are 13 fcuking bits anyway? Could be handy for the --parse option, I must admit. But really, I think being connected isn't too much to ask !
If a majority of people don't like it, I'll reverse it back to a grep line !

Thanks for the feedback, that should help improve it ! But just try to cool it on the way you say it. I'm a student in law, doing it for fun, and for free ;)

Waiting for your input ;) Don't hesitate to mail me !

Cheers

##############


While I agree with unhuman, I agree with that too. Let me clarify : script kiddies should keep the hell away from it. Noobs should devour the source to learn what is going on.
As stated in the disclaimer (cf. source), this script is intended for learning purposes (both bash and network security). I believe I wrote the needed comments in it for anyone to understand what's going on !

chillout bromaX, we're all on the same team.

As far as I can tell the ONLY reason this script requires bash is because of the use of the '-e' flag on the read command. The version of ash on the n900 does not have that flag. Can the script be re-written to omit the use of the '-e' (readline) flag?

As you don't have an n900 I will explain. There is no xterm as such, the terminal emulator built in is called 'osso-xterm'. While xterm has been built for the n900 it sucks harder than the hoover dam. Unfortunatley running a command under osso-xterm requires a little more finesse.

After a bit of discussion on maemo IRC it was determined that to run a command under osso... instead of xterm you need to run ASH with your command passed to it as a script.

i.e.

Code:

osso-xterm -e "ash -c 'ettercap -blah -blah -blah';read foo;'"
As you cannot test this I will start looking into how xterm can be replaced by osso-xterm.

As for wget'ting the list of key words, it would be far better to have a list of the keywords defined at the start of the script and to grep as you said with no need to access the internet. What if I am uh testing the pens of a completly locked off LAN?

Also there are numerous spelling mistakes and supeflous wordage that could be trimmed out.

If you are wondering why it is important to have have as few dependancies as possible it is becasue the n900 is challenged for resources enough as it is. Besides as an engineer I crave the simplest most elegant solution that uses the basic tools that are available.

For this to be simple and elegant, it has to be self contained and flexible.

comaX 2011-06-16 10:38

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by vi_ (Post 1030130)
chillout bromaX, we're all on the same team.
[...]
For this to be simple and elegant, it has to be self contained and flexible.

" Can the script be re-written to omit the use of the '-e' (readline) flag?"
Consider it done ! As I said earlier (maybe it was a mail though, not this thread), the -e flag is pretty useless.

"As you cannot test this I will start looking into how xterm can be replaced by osso-xterm." Please ! That would be great !

" What if I am uh testing the pens of a completly locked off LAN?" Yup, good point ! (but unlikely)

"Also there are numerous spelling mistakes and supeflous wordage that could be trimmed out."
I did ask people to give me feedback on that too, many times, but it seems it doesn't bother them. It matters to me though, so please, mail me anything I can correct. I try my best but english isn't my native language so grammatical errors and all are to be expected.

About the superfluous wordage, I think you mean things I did on purpose, like asking what ports, what gateway, etc. The first goal of the script it to learn from it. That way people know a minimum about what they are doing. But sure, that script could be trimmed down to almost nothing if I decided to make a real, full automation. That is not my goal though !

"If you are wondering why it is important to have have as few dependancies as possible it is becasue the n900 is challenged for resources enough as it is. Besides as an engineer I crave the simplest most elegant solution that uses the basic tools that are available."
All right, I understand ! Let's do that :)

In a nutshell : get rid of wgets, xterms, and -e. On another note, get rid of bad engrish.

Since there is quite a few things to do, could you mail me so that we don't spam this thread too much ? I don't mind though, but it's better if we keep it clean !

Thanks again !

vi_ 2011-06-16 11:05

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by comaX (Post 1030137)
" Can the script be re-written to omit the use of the '-e' (readline) flag?"
Consider it done ! As I said earlier (maybe it was a mail though, not this thread), the -e flag is pretty useless.

"As you cannot test this I will start looking into how xterm can be replaced by osso-xterm." Please ! That would be great !

" What if I am uh testing the pens of a completly locked off LAN?" Yup, good point ! (but unlikely)

"Also there are numerous spelling mistakes and supeflous wordage that could be trimmed out."
I did ask people to give me feedback on that too, many times, but it seems it doesn't bother them. It matters to me though, so please, mail me anything I can correct. I try my best but english isn't my native language so grammatical errors and all are to be expected.

About the superfluous wordage, I think you mean things I did on purpose, like asking what ports, what gateway, etc. The first goal of the script it to learn from it. That way people know a minimum about what they are doing. But sure, that script could be trimmed down to almost nothing if I decided to make a real, full automation. That is not my goal though !

"If you are wondering why it is important to have have as few dependancies as possible it is becasue the n900 is challenged for resources enough as it is. Besides as an engineer I crave the simplest most elegant solution that uses the basic tools that are available."
All right, I understand ! Let's do that :)

In a nutshell : get rid of wgets, xterms, and -e. On another note, get rid of bad engrish.

Since there is quite a few things to do, could you mail me so that we don't spam this thread too much ? I don't mind though, but it's better if we keep it clean !

Thanks again !

I think it is better to keep development in the open, that way when one of the real hardcore scripters (i.e. not me) see it they might lend an ear (*ahem benson).

I think I have removed the need for xterm however I have not had an oppurtunity to test if it actually works!(I am at work ;))

I have altered some of the read choices so you dont have to press enter.

Code:

read -n 1 variable
just grabs the first character and does not need a return character.

You can see how I have done it in the link below.

http://pastebin.com/DT2ReF1V

I will probably have a hack at this later tonight.

comaX 2011-06-16 11:33

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

II think I have removed the need for xterm however I have not had an oppurtunity to test if it actually works!(I am at work )

I have altered some of the read choices so you dont have to press enter.

Code:
read -n 1 variable
just grabs the first character and does not need a return character.

You can see how I have done it in the link below.

http://pastebin.com/DT2ReF1V

I will probably have a hack at this later tonight
I know the -n option, but pressing return never bothered me. And if someone makes a mistake, he can correct it before continuing to something he might not want...

About the xterm, that's great ! I'll just wait for it I guess ;)

Take your time, there's no hurry !

torpedo48 2011-06-16 14:45

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by vi_ (Post 1030161)
You can see how I have done it in the link below.

http://pastebin.com/DT2ReF1V

I will probably have a hack at this later tonight.

I'm trying your modified version, it seems that it doesn't work cause the osso-xterm windows don't have root access (solved by adding a "sudo" in front of the commands, I have sudser installed); using sudo works pretty well, but it can't correctly kill the processes when closing.

Thanks everyone for the hard work ;)

vi_ 2011-06-16 14:57

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by torpedo48 (Post 1030292)
I'm trying your modified version, it seems that it doesn't work cause the osso-xterm windows don't have root access (solved by adding a "sudo" in front of the commands, I have sudser installed); using sudo works pretty well, but it can't correctly kill the processes when closing.

Thanks everyone for the hard work ;)

Thankyou for testing torp, if you are feeling adventurous, try modifying all the 'osso-xterm' lines with:

Code:

osso-xterm -e "ash -c 'sudo somecommand;read foo;exit;'"
i.e. add the exit command as shown above to the end of each call to osso-xterm. If this works the next logical step is to write a sub-routine that will take any command and run it as root in a term.

i.e.

Code:

root_term(command){
osso-xterm -e "ash -c 'sudo $command;read foo;exit;'"}

or somthing.

Seker_94 2011-06-16 15:09

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
You Guys Should Realy check this link out

http://talk.maemo.org/showthread.php?t=73572

it has all the tools needed

torpedo48 2011-06-16 15:23

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by vi_ (Post 1030299)
Thankyou for testing torp, if you are feeling adventurous, try modifying all the 'osso-xterm' lines with:

Code:

osso-xterm -e "ash -c 'sudo somecommand;read foo;exit;'"
i.e. add the exit command as shown above to the end of each call to osso-xterm.

It seems not to work, at the closing of the script ettercap and rtp windows are still there. No alternative ideas here :(


All times are GMT. The time now is 15:12.

vBulletin® Version 3.8.8