![]() |
[HOWTO]: the n9 as an evil access point #mitm #ngrep #dsniff #tcpdump #sslstrip
the n9 as an evil access point #mitm
Prelude: I used it in all these tools for development and privat use, e.g. you shouldn't use it in a coffee-shop, call your hotspot "Free-Wifi" and turn the encryption off :P The last month I looked for a way to use my n9 as package sniffer and I figured out some usefull stuff ... ... my train of thought was - how can I sniff whatever it's transmitted through my stock wifi-hotspot (joikuspot) ... ... so here's a guideline of what I got working and how it works: mitm My device: Nokia n9, Linux RM 696 2.6.32.54-dfl-161-20121301 open mode, meego Harmattan PR1.3 Pre-dependencies: Quote:
1. tcpdump + tcpxtract 2. ngrep 3. dsniff [dsniff itself] 4. ssldump? 1. tcpdump + tcpxtract: tcpdump is a very powerful package analyzer - you can dump nearly all traffic with this tool ... tcpxtract is a tool to rebuild data from tcpdump-pcap files... let's install the packages [and dependencies]: Quote:
Quote:
Quote:
open a website on the client ... tcpdump will capture it. when you think you are finished, kill tcpdump [crtl+c] now we will convert the captured traffic: Quote:
I LIKE! :) 2. ngrep ngrep is a very powerful tool as well - you can analyze traffic live... I'm going to show you how to filter the traffic by some regular expressions to look for logins: first install the necessary dependencies and ngrep itself: Quote:
Quote:
Quote:
... What it doesn't do is capturing htaccess logins, I use dsniff for it. 3. dsniff dsniff? - omg, it's awesome! it includes: Quote:
I took the libdb4.6_4.6.21-16_armel and libnids1.21_1.23-2_armel from the debian repository. Here's dsniff_2.4b1+debian-18_armel Quote:
dsniff itself is very simple to use - it has a build-in filter. I used it to sniff the authentication for htaccess logins as well as ftp logins: Quote:
4. sslstrip? sslstrip strips down your https connections to http ... ... I found a way to pipe your local connection through sslstrip, but not with the hotspot connected client. All I did was to modify my APN connection - I activated the http_proxy on 127.0.0.1 and port 10000, and changed a gconf setting (gconftool-2 -t string -s /system/proxy/mode "manual") - deactivate and activate the connection again and fire up sslstrip. An alternative for testing is to set the http proxy in firefox. What I figured out was: The Joikuspot doesn't use the APN entry from the phone settings, because I tried to add a second APN with some changed settings and it won't show up in the properties of Joikuspot. - Maybe that's why it doesn't take the proxy settings from the APN ... anyway, I'm still working on a workaround! Here's sslstrip-0.9 (taken from http://www.thoughtcrime.org/) Quote:
cheers! |
Re: [HOWTO]: the n9 as an evil access point #mitm #ngrep #dsniff #tcpdump #sslstrip
This is an awesome Post... Why are people overlooking it?
|
Re: [HOWTO]: the n9 as an evil access point #mitm #ngrep #dsniff #tcpdump #sslstrip
Quote:
|
Re: [HOWTO]: the n9 as an evil access point #mitm #ngrep #dsniff #tcpdump #sslstrip
packet sniffer tool on n9 whoa :shock:
need to know if this will work on stock kernel :< |
Re: [HOWTO]: the n9 as an evil access point #mitm #ngrep #dsniff #tcpdump #sslstrip
Quote:
Give it a try and tell me about it ;) cheers |
Re: [HOWTO]: the n9 as an evil access point #mitm #ngrep #dsniff #tcpdump #sslstrip
Quote:
|
Re: [HOWTO]: the n9 as an evil access point #mitm #ngrep #dsniff #tcpdump #sslstrip
added dante and sslstrip to shared repo ... dsc link for others are welcome too :)
|
Re: [HOWTO]: the n9 as an evil access point #mitm #ngrep #dsniff #tcpdump #sslstrip
checked dante-client, not working. configured /etc/dante.conf, started socksify /usr/bin/grob -> process freezed and nothing happened
|
Re: [HOWTO]: the n9 as an evil access point #mitm #ngrep #dsniff #tcpdump #sslstrip
thx for reporting ,feel free to branch it from obs and fix it :)
added dsniff among others ... apt-get install tcpdump tcpxtract ngrep ssldump Please check everything is there and confirm it is usable |
All times are GMT. The time now is 04:59. |
vBulletin® Version 3.8.8