|
2011-06-25
, 22:55
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#173
|
|
2011-06-26
, 11:27
|
Posts: 83 |
Thanked: 142 times |
Joined on Jun 2011
@ Paris, France
|
#175
|
The Following User Says Thank You to comaX For This Useful Post: | ||
|
2011-06-27
, 10:51
|
|
Posts: 870 |
Thanked: 133 times |
Joined on Aug 2010
|
#176
|
# # # # # # ##### # # # # ## ## # # # # # # # # # # # # # # # # # # # # # # # ##### # ####### # # ####### # # # # # # # # # # # # # # # # # ##### ARM Edition For Pcsi3ence.info =========================================================================== = Welcome to Yet Another MITM Automation Script. = = Use this tool responsibly, and enjoy! = = Feel free to contribute and distribute this script as you please. = = Official thread : http://tinyurl.com/yamas-arm = = Check out the help (-h) to see edition informations = = You are running YAMAS-arm = =========================================================================== [+] Cleaning iptables [-] Cleaned. /usr/bin/mitm_pcsci3nce.sh: line 271: ip: not found [+] Activating IP forwarding... [-] Activated. [+] Configuring iptables... To what port should the traffic be redirected to? (default = 8080) Port 8080 selected as default. From what port should the traffic be redirected to? (default = 80) Port 80 selected as default. Traffic from port 80 will be redirected to port 8080 [-] Traffic rerouted [+] Activating sslstrip... Choose filename to output : (default = yamas) Sslstrip will be listening on port 8080 and outputting log in /home/user/MyDocs/Yamas/yamas.txt sslstrip 0.9 by Moxie Marlinspike running... [-] Sslstrip is running. [+] Activating ARP poisoning... /usr/bin/mitm_pcsci3nce.sh: line 412: ip: not found /usr/bin/mitm_pcsci3nce.sh: line 413: ip: not found Enter IP gateway adress or press enter to use . 192.168.1.1 Using wlan0 as interface We will target the whole network as default. You can discover hosts and enter IP(s) manually by entering D. Press enter to default. sh: missing ]] /usr/bin/mitm_pcsci3nce.sh: line 458: : Permission denied /usr/bin/mitm_pcsci3nce.sh: line 458: xterm: not found Targeting the whole network on 192.168.1.1 on wlan0 with Ettercap [-] Arp cache poisoning is launched. Keep new window(s) running. Attack should be running smooth, enjoy. /usr/bin/mitm_pcsci3nce.sh: line 482: xterm: not found Attack is running. You can : 1. Rescan network. 2. Add a target (useless if targeting whole network). 3. Display ASCII correspondence table. 4. Tail-grep hosts through output (make sure there is traffic). 5. Real-time parsing... 6. Quit properly. Enter the number of the desired option.
|
2011-06-27
, 11:06
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#177
|
The Following User Says Thank You to stevomanu For This Useful Post: | ||
|
2011-06-27
, 11:12
|
|
Posts: 870 |
Thanked: 133 times |
Joined on Aug 2010
|
#178
|
|
2011-06-27
, 11:18
|
Posts: 83 |
Thanked: 142 times |
Joined on Jun 2011
@ Paris, France
|
#179
|
at the startup checking it says success to all the dependencies so i don't think its the case
|
2011-06-27
, 11:18
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#180
|
at the startup checking it says success to all the dependencies so i don't think its the case
Tags |
pentesting, tester of pens |
|
as soon as the password window opens the up and down hit Zero.
any ideas?
SOUNDCLOUDFACEBOOKYOUTUBETUMBLRTWITTER