The Following 37 Users Say Thank You to vi_ For This Useful Post: | ||
anapospastos, bipinbn, cruster, Drexxx, Estel, fabfour, gaiosgf, gionni88, hardkorek, imo, ivyking, JamesBond@ge, jberezhnoy, jedi, juiceme, K9999, karam, kingoddball, Mentalist Traceur, mony123, mosiomm, mr_pingu, nkirk, psychologe, pursueky, S0urcerr0r, shawwawa, StefanL, stevomanu, stlpaul, te37v, torpedo48, Trestry, vdx29, Verssetti, zdanee |
|
2011-06-17
, 16:33
|
Posts: 1,680 |
Thanked: 3,685 times |
Joined on Jan 2011
|
#2
|
sudo sed -i "s/(prefix='wifite')/(prefix='wifite',dir='\/opt\/tmp')/g" /opt/wifi_mon/wifite.py; sudo if [ ! -d "/opt/tmp" ]; then mkdir /opt/tmp; fi
#!/bin/sh #wifite starter /opt/wifi_mon/load.sh sleep 2 ifconfig wlan0 down sleep 1 iwconfig wlan0 mode monitor sleep 1 ifconfig wlan0 up sleep 1 python /opt/wifi_mon/wifite.py --power 12 --pps 500 --anon
#!/bin/sh /opt/wifi_mon/unload.sh
tar xzvf wifi.tgz
The Following 29 Users Say Thank You to vi_ For This Useful Post: | ||
|
2011-06-17
, 16:40
|
Posts: 1,163 |
Thanked: 1,873 times |
Joined on Feb 2011
@ The Netherlands
|
#3
|
|
2011-06-17
, 16:45
|
Posts: 1,680 |
Thanked: 3,685 times |
Joined on Jan 2011
|
#5
|
Nice was about to write also a tutorial for karam for his thread about wifite;py but you did it already. I have just the original script running and I have no problems at all. But your modified script made me wonder how does it turn monitor mode on?
Why don't you use the mon0 interface spawned by airmon? Since Mentalist Traceur updated iw it doesn't conflict with aircrack anymore and thus airmon works. IMO must easier as you can still browse the web with wlan0
The Following User Says Thank You to vi_ For This Useful Post: | ||
|
2011-06-17
, 16:53
|
|
Posts: 218 |
Thanked: 59 times |
Joined on Feb 2010
@ spain
|
#6
|
The Following User Says Thank You to Straycat For This Useful Post: | ||
|
2011-06-17
, 16:57
|
Posts: 1,163 |
Thanked: 1,873 times |
Joined on Feb 2011
@ The Netherlands
|
#7
|
|
2011-06-17
, 17:00
|
Posts: 489 |
Thanked: 404 times |
Joined on Dec 2009
|
#8
|
The Following 5 Users Say Thank You to torpedo48 For This Useful Post: | ||
|
2011-06-17
, 17:18
|
Posts: 489 |
Thanked: 404 times |
Joined on Dec 2009
|
#9
|
|
2011-06-17
, 17:29
|
Posts: 146 |
Thanked: 39 times |
Joined on May 2010
|
#10
|
Tags |
free internetz, hack the gibson, hack the planet |
|
You have probably seen the YAMAS MITM ARP spoof script that was recently announced. While an interesting idea, it was not written with the N900 in mind. Thus, it had numerous points that needed addressed before it could be considered ready for N900.
Greetz!
Thanks to comax for writing the thing.
Unhuman for hosting, alerting us to it.
Torpedo48 for testing, development.
Here I present a more N900 friendly version. This is better than the original because:
it has far fewer dependencies
is more compatible with a stock N900
it shutsdown ethercap nicely without barfing on the routers ARP table.
REQUIREMENTS:
iptables
nmap
iproute
python-twisted-web
python-openssl
python-scapy
libpcap0.8
libpcre3
sslstrip*see below
ettercap*see below
*Installation guide for ettercap, sslstrip and many other tools can be found at: http://pcsci3nce.info/?p=9
Refer to unhumans original post and blog for more details.
Script here:
link
Installer!
navigate to the directory you want to put the script in then run:
Last edited by vi_; 2011-06-25 at 14:32.