Notices


Reply
Thread Tools
Posts: 69 | Thanked: 7 times | Joined on Nov 2009
#171
i have bleeding edge installed and some custom drivers for wl11251

as soon as the password window opens the up and down hit Zero.

any ideas?
 
Posts: 69 | Thanked: 7 times | Joined on Nov 2009
#172
i have bleeding edge installed and some custom drivers for wl11251

as soon as the password window opens the up and down hit Zero.

any ideas?
 
Posts: 529 | Thanked: 194 times | Joined on Aug 2010 @ UK
#173
Originally Posted by Chrome View Post
Some screenies of Saturn version


what is the last screenshot please ..
__________________
METASPLOIT INSTALL N900
Keep the forums clean
Dont forget to say thanks

Last edited by stevomanu; 2011-06-25 at 23:02.
 
Chrome's Avatar
Posts: 349 | Thanked: 309 times | Joined on Feb 2010 @ PS/IL
#174
Originally Posted by stevomanu View Post
what is the last screenshot please ..
Tail-grep hosts, option 4 in the script.
 

The Following User Says Thank You to Chrome For This Useful Post:
Posts: 83 | Thanked: 142 times | Joined on Jun 2011 @ Paris, France
#175
Originally Posted by Chrome View Post
Tail-grep hosts, option 4 in the script.
Yeahp, by the way, I should maybe do it only for secure references or POST data... And correct the title ><

EDIT : started working on DNS spoofing
__________________
http://comax.fr/
"I like to dissect girls. Did you know I am utterly insane ?"

Last edited by comaX; 2011-06-27 at 10:14.
 

The Following User Says Thank You to comaX For This Useful Post:
AgogData's Avatar
Posts: 870 | Thanked: 133 times | Joined on Aug 2010
#176
i have all the dependencies and i chmod-ed +x the script in /usr/bin but i get alot of 'not found' and 'permission denied' also i want to scan the whole network but it keep saying 0 network
here is the otput :

- there must be a password captured in order to save it in Yamas the older, right ? or it may leave an empty password.txt ?

Code:
                  #     #    #    #     #    #     #####  
                   #   #    # #   ##   ##   # #   #     # 
                    # #    #   #  # # # #  #   #  #       
                     #    #     # #  #  # #     #  #####  
                     #    ####### #     # #######       # 
                     #    #     # #     # #     # #     # 
                     #    #     # #     # #     #  #####
                        ARM Edition For Pcsi3ence.info
===========================================================================
=       Welcome to Yet Another MITM Automation Script.                    =
=       Use this tool responsibly, and enjoy!                             =
=       Feel free to contribute and distribute this script as you please. =
=       Official thread : http://tinyurl.com/yamas-arm                    =
=       Check out the help (-h) to see edition informations               =
=       You are running YAMAS-arm                                         =
===========================================================================
 [+] Cleaning iptables 
[-] Cleaned.
/usr/bin/mitm_pcsci3nce.sh: line 271: ip: not found

 [+] Activating IP forwarding... 
[-] Activated.

 [+] Configuring iptables... 
 To what port should the traffic be redirected to? (default = 8080)

Port 8080 selected as default.

 From what port should the traffic be redirected to? (default = 80)

Port 80 selected as default.


 Traffic from port 80 will be redirected to port 8080 
[-] Traffic rerouted

 [+] Activating sslstrip... 
Choose filename to output : (default = yamas)

 Sslstrip will be listening on port 8080 and outputting log in /home/user/MyDocs/Yamas/yamas.txt

sslstrip 0.9 by Moxie Marlinspike running...

 [-] Sslstrip is running.


 [+] Activating ARP poisoning... 

/usr/bin/mitm_pcsci3nce.sh: line 412: ip: not found
/usr/bin/mitm_pcsci3nce.sh: line 413: ip: not found

Enter IP gateway adress or press enter to use .
192.168.1.1

Using wlan0 as interface

We will target the whole network as default. You can discover hosts and enter IP(s) manually by entering D.
Press enter to default.


sh: missing ]]
/usr/bin/mitm_pcsci3nce.sh: line 458: : Permission denied
/usr/bin/mitm_pcsci3nce.sh: line 458: xterm: not found
 Targeting the whole network on 192.168.1.1 on wlan0 with Ettercap
[-] Arp cache poisoning is launched.  Keep new window(s) running. 

 Attack should be running smooth, enjoy.


/usr/bin/mitm_pcsci3nce.sh: line 482: xterm: not found

Attack is running. You can :
   1. Rescan network.
   2. Add a target (useless if targeting whole network).
   3. Display ASCII correspondence table.
   4. Tail-grep hosts through output (make sure there is traffic).
   5. Real-time parsing...
   6. Quit properly.

   Enter the number of the desired option.
 
Posts: 529 | Thanked: 194 times | Joined on Aug 2010 @ UK
#177
sounds to me like your missing some dependencies
__________________
METASPLOIT INSTALL N900
Keep the forums clean
Dont forget to say thanks
 

The Following User Says Thank You to stevomanu For This Useful Post:
AgogData's Avatar
Posts: 870 | Thanked: 133 times | Joined on Aug 2010
#178
Originally Posted by stevomanu View Post
sounds to me like your missing some dependencies
at the startup checking it says success to all the dependencies so i don't think its the case
 
Posts: 83 | Thanked: 142 times | Joined on Jun 2011 @ Paris, France
#179
Originally Posted by AgogData View Post
at the startup checking it says success to all the dependencies so i don't think its the case
Don't follow that check just yet ! I put some in to make a test, but it's not thorough !

It's seems like you are missing "ip" and "xterm" dependencies.
I'll ask Unhuman about the correct paths for those, and will add them to the check.

Sorry for the confusion !
__________________
http://comax.fr/
"I like to dissect girls. Did you know I am utterly insane ?"
 
Posts: 529 | Thanked: 194 times | Joined on Aug 2010 @ UK
#180
Originally Posted by AgogData View Post
at the startup checking it says success to all the dependencies so i don't think its the case
what command did you use to run this ??
__________________
METASPLOIT INSTALL N900
Keep the forums clean
Dont forget to say thanks
 
Reply

Tags
pentesting, tester of pens

Thread Tools

 
Forum Jump


All times are GMT. The time now is 06:25.