Menu

Main Menu
Talk Get Daily Search

Member's Online

    User Name
    Password

    [Announce] Yet another MITM attack script (Yamas-ARM)

    Reply
    Page 33 of 48 | Prev | 23   31     32   33   34     35   43 | Next | Last
    brokensmile | # 321 | 2011-07-20, 18:58 | Report

    wen i rouched the top menu bar line i can see only twp applets in my n900 i.e volume option and battery percentage option... i cant see the all applets like fm transmetter,shortuts,internet,clock,bluetooth etc... the default also went off...how to get it back

    and one more....
    when i went to setting and then cssu tuner i got dis popup mesg "could not detect community ssu being installed
    you may still try to use the cssu tuner

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Estel | # 322 | 2011-07-20, 20:06 | Report

    How the *holy f.u.c.k* Your totally broken system is supposed to be related to Yamas? 0_o

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to Estel For This Useful Post:
    StefanL

     
    comaX | # 323 | 2011-07-21, 10:07 | Report

    ^ This. We might be missing the point though...

    Edit | Forward | Quote | Quick Reply | Thanks

     
    efroname | # 324 | 2011-07-22, 16:36 | Report

    Aaaaaaaaaaaaaaaaaaaaaaaaaaah, I'm freaking out! I have just flashed my N900 and installed only the most necessary applications, but that (censored) (censored) (censored) of a (censored) still gives me the Dissector "dns" not supported (etter.conf line 70) error!

    Please, I'm desperate :P

    Edit | Forward | Quote | Quick Reply | Thanks

     
    comaX | # 325 | 2011-07-28, 17:54 | Report

    Hi guys ! It's nice and all to play hackers, but what about network security ?!

    So, I decided to do a little write up on how to protect yourself or your visitors from this type of attack. You'll find it here : http://comax.fr/yamas.php and then by clicking "how to protect". Not done yet, but it should be done quite soon !

    I'll prolly make a copypasta here

    Edit | Forward | Quote | Quick Reply | Thanks

    Last edited by comaX; 2011-07-28 at 20:43.
    The Following 5 Users Say Thank You to comaX For This Useful Post:
    Chrome, Estel, haffid, StefanL, stevomanu

     
    stevomanu | # 326 | 2011-07-28, 18:31 | Report

    Originally Posted by comaX View Post
    Hi guys ! It's nice and all to play hackers, but what about network security ?!

    So, I decided to do a little write up on how to protect yourself or your visitors from this type of attack. You'll find it here : http://comax.fr/yamas/ and then by clicking "how to protect". Not done yet, but it should be done quite soon !

    I'll prolly make a copypasta here
    just tryed to go toy you site an this is what i was faced with ??

    Code:
    Error 403 - Forbidden
    
    L'accès au fichier requiert une autorisation.

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to stevomanu For This Useful Post:
    comaX

     
    comaX | # 327 | 2011-07-28, 20:42 | Report

    [QUOTE=stevomanu;1060205]just tryed to go toy you site an this is what i was faced with ??

    Code:
    Error 403 - Forbidden
    
    L'accès au fichier requiert une autorisation.
    F*ck, my bad... I put / instead of .php... bad habits ! It's fixed now !

    http://comax.fr/yamas.php !

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following User Says Thank You to comaX For This Useful Post:
    stevomanu

     
    comaX | # 328 | 2011-07-30, 11:59 | Report

    Here's the intro :

    "Introduction -- How it works.

    In the attack Yamas uses, the vector is the poisonning of the victim's ARP cache. ARP is the protocol that will "translate" physical mac adresses into IP adresses on the local network. When an equipement wants to connect to the network, it will ask for the mac of the router's IP, eg : "Who has 192.168.1.1 ? Tell 192.168.1.2". The router then responds "198.168.1.1 [router] is at 11:22:33:44:55:66 [router]". This will be written in the ARP cache of the client. And this is where we come in play. We send spoofed ARP responses : "192.168.1.1 [router] is at 00:11:22:66:66:66 [attacker]". The client will then modify its cache to set the attacker as the router. We then forward the traffic to the real router, which allows us to read, and manilipulate the traffic on-the-fly. That's how we get the passwords. Thanks to sslstrip, we force the clients to send the credentials as clear text, so that we can simply read them.
    All right, but now, how do you protect yourself from that to happen to you ? "

    Yeah, I'm a cheap bastard, you'll have to click this http://comax.fr/yamas.php?frame=protect.php to know what's next

    Edit | Forward | Quote | Quick Reply | Thanks
    The Following 2 Users Say Thank You to comaX For This Useful Post:
    q6600, te37v

     
    q6600 | # 329 | 2011-07-30, 13:31 | Report

    ArpON 2.7
    will work on n900?

    Edit | Forward | Quote | Quick Reply | Thanks

     
    comaX | # 330 | 2011-07-30, 16:53 | Report

    Originally Posted by q6600 View Post
    ArpON 2.7
    will work on n900?
    Dunno... You'll have to see for yourself or wait for someone to try !
    If you read the article, could you give me feedback of any sort in PM please ?

    Cheers

    Edit | Forward | Quote | Quick Reply | Thanks

     
    Page 33 of 48 | Prev | 23   31     32   33   34     35   43 | Next | Last
vBulletin® Version 3.8.8
Normal Logout