|
2011-06-27
, 22:09
|
|
Posts: 870 |
Thanked: 133 times |
Joined on Aug 2010
|
#192
|
Try this:
apt-get install iproute xterm
It will install those two commands you were missing, xterm and ip.
ateway : 192.168.0.1 Interface : wlan0 Enter IP gateway adress or press enter to use 192.168.0.1. sslstrip 0.9 by Moxie Marlinspike running... 192.168.0.1 selected as default. Using wlan0 as interface We will target the whole network as default. You can discover hosts and enter IP(s) manually by entering D. Press enter to default. sh: missing ]] /usr/bin/mitm_pcsci3nce.sh: line 458: : Permission denied Warning: Cannot convert string "nil2" to type FontStruct Targeting the whole network on 192.168.0.1 on wlan0 with Ettercap [-] Arp cache poisoning is launched. Keep new window(s) running. Attack should be running smooth, enjoy. Warning: Cannot convert string "nil2" to type FontStruct Attack is running. You can : 1. Rescan network. 2. Add a target (useless if targeting whole network). 3. Display ASCII correspondence table. 4. Tail-grep hosts through output (make sure there is traffic). 5. Real-time parsing... 6. Quit properly. Enter the number of the desired option.
|
2011-06-28
, 07:37
|
|
Posts: 1,091 |
Thanked: 323 times |
Joined on Feb 2010
@ ~
|
#193
|
This actually worked by opening ettercap and password windows and start poisoning, but after finishing and choosing Y for "do you wanna save the passwords" it says
sh:missing ]]
/usr/bin/mitm.sh: line 484: y: not found
password saving skipped
also i get this after pressing enter for targeting the whole network
i'm using ad-hoc wireless connection hence the 192.168.0.1 IPCode:ateway : 192.168.0.1 Interface : wlan0 Enter IP gateway adress or press enter to use 192.168.0.1. sslstrip 0.9 by Moxie Marlinspike running... 192.168.0.1 selected as default. Using wlan0 as interface We will target the whole network as default. You can discover hosts and enter IP(s) manually by entering D. Press enter to default. sh: missing ]] /usr/bin/mitm_pcsci3nce.sh: line 458: : Permission denied Warning: Cannot convert string "nil2" to type FontStruct Targeting the whole network on 192.168.0.1 on wlan0 with Ettercap [-] Arp cache poisoning is launched. Keep new window(s) running. Attack should be running smooth, enjoy. Warning: Cannot convert string "nil2" to type FontStruct Attack is running. You can : 1. Rescan network. 2. Add a target (useless if targeting whole network). 3. Display ASCII correspondence table. 4. Tail-grep hosts through output (make sure there is traffic). 5. Real-time parsing... 6. Quit properly. Enter the number of the desired option.
|
2011-06-28
, 10:23
|
Posts: 83 |
Thanked: 142 times |
Joined on Jun 2011
@ Paris, France
|
#194
|
|
2011-06-28
, 10:23
|
Posts: 83 |
Thanked: 142 times |
Joined on Jun 2011
@ Paris, France
|
#195
|
I'm using Firefox 5, maybe I should try internet explorer and see if I'm still protected..
|
2011-06-28
, 17:52
|
Posts: 83 |
Thanked: 142 times |
Joined on Jun 2011
@ Paris, France
|
#196
|
Hi comaX and Unhuman,
One more edit for you to consider.
- The dependencies are checked by dpkg (in my opinion agnostic and more resilient to custom installations).
- the dependency check is done not every time but on request using the -d option. That is,
- made the two "wget" to happen only when needed.Code:./mitm_pcsci3nce.sh -d
- the home folder is a variable - easier to change
- one small correction: if the root privileges check failed you were stuck with red font - the echo command color was not terminated.
I think that's all. Thanks again.
if [[ ! -e $pathLog/.ok ]]; then
dep
fi
|
2011-06-28
, 18:07
|
|
Posts: 1,648 |
Thanked: 2,122 times |
Joined on Mar 2007
@ UNKLE's Never Never Land
|
#197
|
|
2011-06-28
, 18:55
|
|
Posts: 870 |
Thanked: 133 times |
Joined on Aug 2010
|
#198
|
I think you need to write a big Y to save the passwords. Also, it looks like you might not run the script as root(hence the "/usr/bin/mitm_pcsci3nce.sh: line 458: : Permission denied").
|
2011-06-28
, 19:01
|
Posts: 83 |
Thanked: 142 times |
Joined on Jun 2011
@ Paris, France
|
#199
|
Agree with all you comments and find your idea nice, something like first run check.
On another subject: if you find it useful, i could package it and even upload it to the repos.
Cheers.
about the Y, i tried it both y and Y..also n and N
and i'm always root before running mitm
|
2011-06-28
, 19:25
|
|
Posts: 870 |
Thanked: 133 times |
Joined on Aug 2010
|
#200
|
Tags |
pentesting, tester of pens |
Thread Tools | |
|
As for easy-creds its not to bad offers some good features a little buggy for me thou to be fair
Keep the forums clean
Dont forget to say thanks