|
|
2011-06-25
, 22:55
|
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#173
|
|
|
2011-06-26
, 11:27
|
|
Posts: 83 |
Thanked: 142 times |
Joined on Jun 2011
@ Paris, France
|
#175
|
| The Following User Says Thank You to comaX For This Useful Post: | ||
|
|
2011-06-27
, 10:51
|
|
|
Posts: 870 |
Thanked: 133 times |
Joined on Aug 2010
|
#176
|
# # # # # # #####
# # # # ## ## # # # #
# # # # # # # # # # #
# # # # # # # # #####
# ####### # # ####### #
# # # # # # # # #
# # # # # # # #####
ARM Edition For Pcsi3ence.info
===========================================================================
= Welcome to Yet Another MITM Automation Script. =
= Use this tool responsibly, and enjoy! =
= Feel free to contribute and distribute this script as you please. =
= Official thread : http://tinyurl.com/yamas-arm =
= Check out the help (-h) to see edition informations =
= You are running YAMAS-arm =
===========================================================================
[+] Cleaning iptables
[-] Cleaned.
/usr/bin/mitm_pcsci3nce.sh: line 271: ip: not found
[+] Activating IP forwarding...
[-] Activated.
[+] Configuring iptables...
To what port should the traffic be redirected to? (default = 8080)
Port 8080 selected as default.
From what port should the traffic be redirected to? (default = 80)
Port 80 selected as default.
Traffic from port 80 will be redirected to port 8080
[-] Traffic rerouted
[+] Activating sslstrip...
Choose filename to output : (default = yamas)
Sslstrip will be listening on port 8080 and outputting log in /home/user/MyDocs/Yamas/yamas.txt
sslstrip 0.9 by Moxie Marlinspike running...
[-] Sslstrip is running.
[+] Activating ARP poisoning...
/usr/bin/mitm_pcsci3nce.sh: line 412: ip: not found
/usr/bin/mitm_pcsci3nce.sh: line 413: ip: not found
Enter IP gateway adress or press enter to use .
192.168.1.1
Using wlan0 as interface
We will target the whole network as default. You can discover hosts and enter IP(s) manually by entering D.
Press enter to default.
sh: missing ]]
/usr/bin/mitm_pcsci3nce.sh: line 458: : Permission denied
/usr/bin/mitm_pcsci3nce.sh: line 458: xterm: not found
Targeting the whole network on 192.168.1.1 on wlan0 with Ettercap
[-] Arp cache poisoning is launched. Keep new window(s) running.
Attack should be running smooth, enjoy.
/usr/bin/mitm_pcsci3nce.sh: line 482: xterm: not found
Attack is running. You can :
1. Rescan network.
2. Add a target (useless if targeting whole network).
3. Display ASCII correspondence table.
4. Tail-grep hosts through output (make sure there is traffic).
5. Real-time parsing...
6. Quit properly.
Enter the number of the desired option.
|
|
2011-06-27
, 11:06
|
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#177
|
| The Following User Says Thank You to stevomanu For This Useful Post: | ||
|
|
2011-06-27
, 11:12
|
|
|
Posts: 870 |
Thanked: 133 times |
Joined on Aug 2010
|
#178
|
|
|
2011-06-27
, 11:18
|
|
Posts: 83 |
Thanked: 142 times |
Joined on Jun 2011
@ Paris, France
|
#179
|
at the startup checking it says success to all the dependencies so i don't think its the case
|
|
2011-06-27
, 11:18
|
|
Posts: 529 |
Thanked: 194 times |
Joined on Aug 2010
@ UK
|
#180
|
at the startup checking it says success to all the dependencies so i don't think its the case
![]() |
| Tags |
| pentesting, tester of pens |
| Thread Tools | |
|
as soon as the password window opens the up and down hit Zero.
any ideas?
SOUNDCLOUDFACEBOOKYOUTUBETUMBLRTWITTER