View Single Post
AgogData's Avatar
Posts: 870 | Thanked: 133 times | Joined on Aug 2010
#176
i have all the dependencies and i chmod-ed +x the script in /usr/bin but i get alot of 'not found' and 'permission denied' also i want to scan the whole network but it keep saying 0 network
here is the otput :

- there must be a password captured in order to save it in Yamas the older, right ? or it may leave an empty password.txt ?

Code:
                  #     #    #    #     #    #     #####  
                   #   #    # #   ##   ##   # #   #     # 
                    # #    #   #  # # # #  #   #  #       
                     #    #     # #  #  # #     #  #####  
                     #    ####### #     # #######       # 
                     #    #     # #     # #     # #     # 
                     #    #     # #     # #     #  #####
                        ARM Edition For Pcsi3ence.info
===========================================================================
=       Welcome to Yet Another MITM Automation Script.                    =
=       Use this tool responsibly, and enjoy!                             =
=       Feel free to contribute and distribute this script as you please. =
=       Official thread : http://tinyurl.com/yamas-arm                    =
=       Check out the help (-h) to see edition informations               =
=       You are running YAMAS-arm                                         =
===========================================================================
 [+] Cleaning iptables 
[-] Cleaned.
/usr/bin/mitm_pcsci3nce.sh: line 271: ip: not found

 [+] Activating IP forwarding... 
[-] Activated.

 [+] Configuring iptables... 
 To what port should the traffic be redirected to? (default = 8080)

Port 8080 selected as default.

 From what port should the traffic be redirected to? (default = 80)

Port 80 selected as default.


 Traffic from port 80 will be redirected to port 8080 
[-] Traffic rerouted

 [+] Activating sslstrip... 
Choose filename to output : (default = yamas)

 Sslstrip will be listening on port 8080 and outputting log in /home/user/MyDocs/Yamas/yamas.txt

sslstrip 0.9 by Moxie Marlinspike running...

 [-] Sslstrip is running.


 [+] Activating ARP poisoning... 

/usr/bin/mitm_pcsci3nce.sh: line 412: ip: not found
/usr/bin/mitm_pcsci3nce.sh: line 413: ip: not found

Enter IP gateway adress or press enter to use .
192.168.1.1

Using wlan0 as interface

We will target the whole network as default. You can discover hosts and enter IP(s) manually by entering D.
Press enter to default.


sh: missing ]]
/usr/bin/mitm_pcsci3nce.sh: line 458: : Permission denied
/usr/bin/mitm_pcsci3nce.sh: line 458: xterm: not found
 Targeting the whole network on 192.168.1.1 on wlan0 with Ettercap
[-] Arp cache poisoning is launched.  Keep new window(s) running. 

 Attack should be running smooth, enjoy.


/usr/bin/mitm_pcsci3nce.sh: line 482: xterm: not found

Attack is running. You can :
   1. Rescan network.
   2. Add a target (useless if targeting whole network).
   3. Display ASCII correspondence table.
   4. Tail-grep hosts through output (make sure there is traffic).
   5. Real-time parsing...
   6. Quit properly.

   Enter the number of the desired option.