|
2011-06-30
, 15:00
|
Posts: 83 |
Thanked: 142 times |
Joined on Jun 2011
@ Paris, France
|
#242
|
Don't abuse the script on foreign networks. If it was your network you would have known if those numbers were a password.
EDIT:
late by 3 <i>minutes</i>
|
2011-06-30
, 15:13
|
Posts: 1,335 |
Thanked: 3,931 times |
Joined on Jul 2010
@ Brittany, France
|
#243
|
|
2011-06-30
, 15:18
|
|
Posts: 870 |
Thanked: 133 times |
Joined on Aug 2010
|
#244
|
Hmm... You sir are a bad student ! Since you're assuming it may be the password, it means you don't know it. If you don't know it, it's not yours. I'm sorry, but I won't help you for that.
Here's just a hint : we are parsing the log.
You should use the script on your own connection and then get log into a maximum of sites to know what the output should look like.
The saving location is just a variable now, so you can change it to whatever suits you Saturn used this location because of some problem with MyDocs not being always available or something.
|
2011-06-30
, 15:18
|
Posts: 102 |
Thanked: 23 times |
Joined on Nov 2009
@ Finland
|
#245
|
|
2011-06-30
, 15:22
|
Posts: 1,163 |
Thanked: 1,873 times |
Joined on Feb 2011
@ The Netherlands
|
#246
|
|
2011-06-30
, 16:04
|
Posts: 102 |
Thanked: 23 times |
Joined on Nov 2009
@ Finland
|
#247
|
|
2011-06-30
, 17:02
|
Posts: 83 |
Thanked: 142 times |
Joined on Jun 2011
@ Paris, France
|
#248
|
yes its not my network, its not illegal here but its rude
anyway i didn't mean any harm to the...victim, just using my n900's ability
rebooted the n900, now i get following in the password window:
BusyBox v1.18.5 (Debian 1.18.5power1) multi-call binary.
No help available.
it flashes every now and then, the grep error dissappeared but i stil get no other output than this..
Runned the attack this day and worked as it should, except that the victim pc got sometimes a page with only the letters:
ht
then reload gives a page with:
hmtl layout code of that page without images
another reload gives:
The actual page, with good layout =D
On the phone side everything works. Gonna need to find my flashdrive with backtrack again, and test if I get these pages when running from backtrack also. Last time I tried a mitm-attack this wonderful script wasn't available :P Thanks for making me this easy, ComaX
Damn frog-eater!*
Still no success at trying Yamas there. I have no idea of what is the problem in my case, since I don't have all the error logs that Price reported, just the one I quoted above.
I can't try it again for the moment 'cause I'm at work, and attacking the wifi of the laboratory/university would be a suicide I guess.
* J'en suis un moi-même. :[
The Following User Says Thank You to comaX For This Useful Post: | ||
|
2011-06-30
, 17:23
|
Posts: 1,163 |
Thanked: 1,873 times |
Joined on Feb 2011
@ The Netherlands
|
#249
|
Yeahp, not my fault ! That's sslstrip's work... I mean, sometimes it will just be fine, but most of the time you'll have to reload once. Let's hope that will be fixed in sslstrip 1.0.
About your BT drive, the original script will ony work on BT5. The BT4r2 version is still available though.
|
2011-06-30
, 17:39
|
Posts: 102 |
Thanked: 23 times |
Joined on Nov 2009
@ Finland
|
#250
|
Tags |
pentesting, tester of pens |
|
EDIT:
late by 3 seconds
http://pcsci3nce.info