maemo.org - Talk

maemo.org - Talk (https://talk.maemo.org/index.php)
-   Applications (https://talk.maemo.org/forumdisplay.php?f=41)
-   -   [Announce] Yet another MITM attack script (Yamas-ARM) (https://talk.maemo.org/showthread.php?t=73988)

MSHAH 2011-06-25 21:19

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
i have bleeding edge installed and some custom drivers for wl11251

as soon as the password window opens the up and down hit Zero.

any ideas?

MSHAH 2011-06-25 21:20

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
i have bleeding edge installed and some custom drivers for wl11251

as soon as the password window opens the up and down hit Zero.

any ideas?

stevomanu 2011-06-25 22:55

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Chrome (Post 1038933)

what is the last screenshot please ..

Chrome 2011-06-25 23:05

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by stevomanu (Post 1039103)
what is the last screenshot please ..

Tail-grep hosts, option 4 in the script.

comaX 2011-06-26 11:27

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by Chrome (Post 1039107)
Tail-grep hosts, option 4 in the script.

Yeahp, by the way, I should maybe do it only for secure references or POST data... And correct the title ><

EDIT : started working on DNS spoofing ;)

AgogData 2011-06-27 10:51

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
i have all the dependencies and i chmod-ed +x the script in /usr/bin but i get alot of 'not found' and 'permission denied' also i want to scan the whole network but it keep saying 0 network
here is the otput :

- there must be a password captured in order to save it in Yamas the older, right ? or it may leave an empty password.txt ?

Code:

                  #    #    #    #    #    #    ##### 
                  #  #    # #  ##  ##  # #  #    #
                    # #    #  #  # # # #  #  #  #     
                    #    #    # #  #  # #    #  ##### 
                    #    ####### #    # #######      #
                    #    #    # #    # #    # #    #
                    #    #    # #    # #    #  #####
                        ARM Edition For Pcsi3ence.info
===========================================================================
=      Welcome to Yet Another MITM Automation Script.                    =
=      Use this tool responsibly, and enjoy!                            =
=      Feel free to contribute and distribute this script as you please. =
=      Official thread : http://tinyurl.com/yamas-arm                    =
=      Check out the help (-h) to see edition informations              =
=      You are running YAMAS-arm                                        =
===========================================================================
 [+] Cleaning iptables
[-] Cleaned.
/usr/bin/mitm_pcsci3nce.sh: line 271: ip: not found

 [+] Activating IP forwarding...
[-] Activated.

 [+] Configuring iptables...
 To what port should the traffic be redirected to? (default = 8080)

Port 8080 selected as default.

 From what port should the traffic be redirected to? (default = 80)

Port 80 selected as default.


 Traffic from port 80 will be redirected to port 8080
[-] Traffic rerouted

 [+] Activating sslstrip...
Choose filename to output : (default = yamas)

 Sslstrip will be listening on port 8080 and outputting log in /home/user/MyDocs/Yamas/yamas.txt

sslstrip 0.9 by Moxie Marlinspike running...

 [-] Sslstrip is running.


 [+] Activating ARP poisoning...

/usr/bin/mitm_pcsci3nce.sh: line 412: ip: not found
/usr/bin/mitm_pcsci3nce.sh: line 413: ip: not found

Enter IP gateway adress or press enter to use .
192.168.1.1

Using wlan0 as interface

We will target the whole network as default. You can discover hosts and enter IP(s) manually by entering D.
Press enter to default.


sh: missing ]]
/usr/bin/mitm_pcsci3nce.sh: line 458: : Permission denied
/usr/bin/mitm_pcsci3nce.sh: line 458: xterm: not found
 Targeting the whole network on 192.168.1.1 on wlan0 with Ettercap
[-] Arp cache poisoning is launched.  Keep new window(s) running.

 Attack should be running smooth, enjoy.


/usr/bin/mitm_pcsci3nce.sh: line 482: xterm: not found

Attack is running. You can :
  1. Rescan network.
  2. Add a target (useless if targeting whole network).
  3. Display ASCII correspondence table.
  4. Tail-grep hosts through output (make sure there is traffic).
  5. Real-time parsing...
  6. Quit properly.

  Enter the number of the desired option.


stevomanu 2011-06-27 11:06

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
sounds to me like your missing some dependencies

AgogData 2011-06-27 11:12

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by stevomanu (Post 1039928)
sounds to me like your missing some dependencies

at the startup checking it says success to all the dependencies so i don't think its the case

comaX 2011-06-27 11:18

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by AgogData (Post 1039932)
at the startup checking it says success to all the dependencies so i don't think its the case

Don't follow that check just yet ! I put some in to make a test, but it's not thorough !

It's seems like you are missing "ip" and "xterm" dependencies.
I'll ask Unhuman about the correct paths for those, and will add them to the check.

Sorry for the confusion !

stevomanu 2011-06-27 11:18

Re: [Announce] Yet another MITM attack script (Yamas-ARM)
 
Quote:

Originally Posted by AgogData (Post 1039932)
at the startup checking it says success to all the dependencies so i don't think its the case

what command did you use to run this ??


All times are GMT. The time now is 08:33.

vBulletin® Version 3.8.8