View Single Post
pursueky's Avatar
Posts: 191 | Thanked: 46 times | Joined on Jun 2010 @ NanJing China
#118
Originally Posted by vi_ View Post
update: new version, everything fixed now

You have probably seen the YAMAS MITM ARP spoof script that was recently announced. While an interesting idea, it was not written with the N900 in mind. Thus, it had numerous points that needed addressed before it could be considered ready for N900.


Greetz!

Thanks to comax for writing the thing.

Unhuman for hosting, alerting us to it.

Torpedo48 for testing, development.

Here I present a more N900 friendly version. This is better than the original because:

it has far fewer dependencies
is more compatible with a stock N900
it shutsdown ethercap nicely without barfing on the routers ARP table.



REQUIREMENTS:

iptables
nmap
iproute
python-twisted-web
python-openssl
python-scapy
libpcap0.8
libpcre3
sslstrip*see below
ettercap*see below

*Installation guide for ettercap, sslstrip and many other tools can be found at: http://pcsci3nce.info/?p=9

Refer to unhumans original post and blog for more details.

Script here:

link


Installer!

navigate to the directory you want to put the script in then run:

Code:
wget http://pastebin.com/raw.php?i=u5nLZzra -O ./yamas_n900.sh && chmod +x ./yamas_n900.sh
but it doesn't run in:
sh yasmas_n900.sh
or
bash yasmas_n900.sh

the same error loads as:
/home/user/MyDocs # bash yamas_n900.sh
: command not found 4:
'amas_n900.sh: line 26: syntax error near unexpected token `in
'amas_n900.sh: line 26: ` case $1 in
/home/user/MyDocs # sh yamas_n900.sh
: not foundsh: line 4:
yamas_n900.sh: line 26: syntax error: unexpected word (expecting "in")
/home/user/MyDocs #