Jump to content

uberleethax0r

Active Members
  • Posts

    10
  • Joined

  • Last visited

Recent Profile Visitors

1,872 profile views

uberleethax0r's Achievements

Newbie

Newbie (1/14)

  1. They both work on their own. Arpspoofing properly makes the target think that the gateway is the mac address of the hax0r computer, but it doesn't strip ssl.
  2. K, so, I tried it in three operating systems: Windows, Backtrack (Which is a butt- it took me hours to get my wireless card working with ndiswrapper, but, that's another story.) and Ubuntu although I don't see why it would matter. I also tested it on three different LANs just to make sure it wasn't my gateway noticing it somehow. So, first enable ip forwarding in the sysctrl configuration, and then sudo iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080 and then sudo python sslstrip.py -l 8080 Arpspoofing: sudo arpspoof -i eth1 -t 192.168.0.5 192.168.0.1 /me doesn't get why it doesn't work. It works perfectly when I set an http proxy to the hax0r computer on port 8080, but arpspoofing doesn't work. We haven't made any progress on this forum thread. (No offense to you that answered - thank you.) Anyone got ideas?
  3. Okay, ah well.. Thanks for the info..
  4. Dang, that's scary that that works... Someone can actually make everybody on the LAN think their computer is a gateway.. As far as I can tell, that arpspoofing seems to work flawlessly. HOWEVER: I DON'T CARE ABOUT ARSPOOFING EVERYONE ON A LAN! Why does SSLstrip not work when arpspoof-ified? Arpspoofing and SSLstrip each work on their own, but not together. Also, how do I get that to work? I guess I didn't explain my question very well, but anyone get it now? Has anyone had this trouble? I followed the instructions exactly from Hak5, but the sslstrip-age doesn't work without specifically declaring the target computer to follow the port sslstrip listens on.
  5. As in, arpspoof everyone in the subnet? Does that work? Anyway, what does that do for me? Like arpspoof -t 192.168.1.* 192.168.1.1 or variant? In every variant of that, it just gives back an error and doesn't do anything.
  6. http://sourceforge.net/projects/arpspoof/ for arpspoof windows binary. python with python libraries for sslstrip, and http://kennethxu.blogspot.com/2006/04/java...forwarding.html for port forwarding
  7. Er, yeah. I kinda think you missed the point. What I'm saying is how do you get sslstrip to work with arp poisoning? Like, instead of setting the victim's firefox http proxy to 192.168.1.2:80 ,etc.
  8. Whoops, sorry if I posted this topic in the wrong section. I guess I didn't read it properly.
  9. Howdy all! I recently started watching Hak5, and have started to be a little more paranoid about my own online security. I want to try out some of the projects for myself, just to get a sense of network security. I have been working on getting SSLstrip to work on my own Windows computers, but I'm having a little trouble. So, I can get SSL strip to work properly if I set the target machine's Firefox settings to listen to the hacker machine's port that I forwarded, as an HTTP proxy. Obviously, no man in the middle attack victims will have their proxy set that way, so I want to try ARP spoofing. I can get Arp spoofing to properly send traffic from the target computer through mine, using Ettercap or Arpspoof, but for some reason, SSLstrip doesn't work using it. Anyone know how to fix that?
×
×
  • Create New...