-
Posts
939 -
Joined
-
Last visited
-
Days Won
22
Posts posted by i8igmac
-
-
I do remember doing exactly what u said... but I feel that all the problems you will find, there is a cleaner way to handle this...Makes sense as the HTML source code probably comes in several packets. If you are able to choose what to replace you could search for comments (i.e. with regular expression), cut them out, inject your code and fill it up until the original size is restored. This might be a little workaround without making too much damage to the website itself.
Its all about success rate... lets say ettercap fails 30% of the time to provide clean content modification, a small proxy will get you closer to 95% successful and clean content (my testing years ago)
-
From my experience, I remember swapping data with ettercap, if the string size was larger then the original then the clients browser wwould not always provide the correct amount of data, for example the page source may be missing at the end </HTML>
replace(12345, 1234567)
Page may be missing L>
</HTM
-
Read this, vm installs or hd installs of kali may cause issues i guess
Edit;
Its just ettercaps ugly ways lol one day it works another day your like wtf... this frustration is why I wrote a proxy to do the data swap. . . Im sure its a small step you are missing...
Arpspoof
Dnsspoof
And a proxy kungfoo replaces ettercap...
Ettercap -T -q -f filter -M ARP // //
Its been a few years since I used ettercap
Edit;
-
When ettercap starts up. Does it say set the uid? And did you enable iptables in etter.conf ?
Also test ur browser at a site that does not use https
Msn
Yaho
Etc
-
Your ettercap config may need iptables enabled... idk maybe u have already done this
Also u need to see plain text, accept-encoding rrplace wi. Azzept-encoding
Idk maybe u leedt that part out of your post
-
100% reliable proxy written in your choice for the basic framework that suports https aswell, then each exploit could be a plugin
If the GET request includes('*.exe') then launch the basic-plugin.rb for the swapping function that meets these if statements... mod the content length andd swap the data
Plugins could be the language of your choice, simply handle the specific request and provide a response design for that exploit
-
it is a subject that needs more work, you need a payload to cover all situations... I have spent some long hours working on this subject and could provide help
-
can you test this inside the local network... don't involve the router and port forwarding just yet...
when I run into these kinds of problems ill start my test with netcat to duplicate the task with hi world examples...
You have one machine(192.168.0.101) listening on a port that provides console access
nc -l -p 22
And machine two(192.168.0.102) connecting to the first machine with intentions of using the console service
Nc 192.168.0.102 22
And then test that the connection works by typing 'hi world from machine2'
At this point you know that anything can now be accomplished threw this tcp stream...
so you want a connect back? your machine 1 connects to machine 2 on port 3333 and slides in the data existing on port 22?
I can help you recreate this, at the moment I'm away from my puters
So if you interested, look online for ssh pipe with netcat. I have found better luck with pipes abd nc
-
I have built yagi's and biquad's, I was not that impressed... if you include a parabolic rear reflector in your build then you will experience HUGE gain
I can play online first person shooters with no lag... extremely long distance threw walls and trees.
If you need a a pig tail, I opened up a detachable antenna, spliced on a barrel connector that will fit most coax cable connectors the dish network guys leave behind
I have example videos on youtube if you are interested
-
So, i am looking to complete the build on my raspberry pi b+, i hope to get some bang out of my buck.
alfa card
Battery
i seek guidance on purchasing a proper battery in the 30$ range. I plan to run 2 wifi cards... from what I read, I should not need a powered usb hub with model b+ ???
Then my gut says get the alfa awus036h. What about other models? should i go with the model that supports karma?
-
Watch "Parabolic Antennas for 2 4GHz part 1" on YouTube
Parabolic Antennas for 2 4GHz part 1:
I would build a clean little parabolic reflector... recycle the big ugly dish...
Or if you would like to try and use the dish, build a biquad element
-
Watch "Parabolic Antennas for 2 4GHz part 1" on YouTube
Parabolic Antennas for 2 4GHz part 1:
For directional home build, this would be my recommendation... the parabolic reflector will take your driven element threw space and time :-P or threw walls and tree's
-
Its ddwrt repeater... no other machine acts this way... this is a service issue. I will test other wifi router befor i rule this outVery strange. Is this something you may have configured in the AP, that it either doesn't broadcast or broadcasts less often (trying to be hidden or whatever)?
/etc/networkig/interfaces
Wlan0 manual
mon0 manual
From what i understand, this would tell networking service not to bothere with the device
soak
I did start a ping process that does not print stdout. Funny story
-
it seems to be the network services are not what im used to... wheeze? ugly? nasty? stupid?
service network stop
service network-manager stop
iwconfig wlan0 essid mywifi
dhclient wlan0
seems that i can ping google.com... If i stop pinging google then not long after ill see this error in dmesg
ieee80211 phy0: wlan0: No probe response from AP 02:1c:10:4e:2f:5c after 500ms, disconnecting
Do your wifi and ethernet get IP addresses from separate subnets? Maybe the routing rules don't add up.
been at this for 3 days now over ssh... so at this point i have ethernet unplugged, hdmi is now pluged in and i got my keyboard out... daunting task...
i guess ill start a backgroud process of a ping google LOL what a joke
:shoots_his_brains_out:
-
this has been frustrating... I can't get my wifi card to stay connected to my wifi or ping google... I have ethernet pluged into the device so I can ssh to the pi root@192.168.70.135
Iwconfig wlan0 essid mywifi
Dhclient
My attempt to connect does not work for long.
Nmap -e wlan0 -sP 192.168.70.1 google.com
Resaults: 192.168.70.1 responds but google fails
And not long after wlan0 disconnects
ieee80211 phy0: wlan0: No probe response from AP 02:1c:10:4e:2f:5c after 500ms, disconnecting
I feel that because im connected by eth0 at the start, this may prevent wlan0 from becoming associated
-
When kali has the exploit handler running on the port of your choice... if your router is configured properly then the tool below will show the port is open
http://www.t1shopper.com/tools/port-scan/
My guess, if the port is open and responds then i bet you may have generated the payload wrong
-
I fixed this problem by installing the old stable 1.1
-
tcp_read_time_out 15000
tcp_connect_time_out 8000
this maybe default setting I found on pastebin... try
50000
30000
you have to update ur proxy list... they don't stay up for long... try 20 at a time
-
Try other browsers, try other sites... https hak5 works well... https facebook is a little tricky
-
Maybe someone could confirm or correct what I have here...
plug the wifi card in to start with a blank canvass... testing with kali arm raspbery image
service network-manager stop pkill wpa-supplicant pkill dhclient Iwconfig wlan0 essid my-wifi Dhclient wlan0
Services that may interfere are properly stopped? Connection with my-wifi establishedIfconfig wlan0 down Iwconfig wlan0 mode monitor ifconfig wlan0 up
At this point you should be able to ping other devices on the network threw wlan0 with nmap... you are now established in monitor mode...airbase-ng wlan0 -P -C 60
Now you are almost set. All that is left is iptables and dns masq to hand out ip's to the clients to forward traffic... you should not see any errors, channel -1errorsand now cinfigure iptables and dnsmasq
iptables --flush && iptables --table nat --flush && iptables --delete-chain && iptables --table nat --delete-chain iptables --table nat --append POSTROUTING --out-interface wlan0 -j MASQUERADE iptables --append FORWARD --in-interface at0 -j ACCEPT echo 1 > /proc/sys/net/ipv4/ip_forward echo 'dhcp-range=192.168.96.50,192.168.96.150,12h' > /etc/dnsmasq.conf ifconfig at0 192.168.96.1 up pkill dnsmasq dnsmasq
You should have a karma like fake ap running on your kali linux machine with working internet from one wifi device... i may need help correcting the iptables... -
Im curious, at my house i see in airodump 3 device and one of them is open and essid is xfinitywifi.
12:aa:bb:cc:dd:ee essid xfinitywifi open
13:aa:bb:cc:dd:ee
14:aa:bb:cc:dd:ee
almost exact same mac address... are these access points outside on a phone pole? Maybe a stupid question lol
-
looks interesting, I have setup a webcam to a linux machine and apt-get install motion... motion detection, some http protocal live stream andl auto upload options
Your instructions look clean and thanks for advice on future prohects
-
you should also look into time out options. Increasing the amount of time before a connection is timed out.
I use a very large list of proxy. if one fails within the specified time on options it would move on to the next
-
on linux mint and kali running on my labtop I can connect to my home network and then run airbase-ng to broadcast another wifi essid...
so. While my wifi card is connected to my home ap ill set the card to monitor made and place the card on the same channel and start airbase mon0 -P -C 60 -c 6
Iwconfig wlan0 mode monitor
Iwconfig wlan0 channel 6
Airbase-ng wlan0 -e free-wifi
with dns configured and iptables i now have a working repeater/fake-ap or what ever you want to call it
Now my question is I would like to understand why these services running on gnome kali and gnome mint don't interfere with the task above but other linux os networking service don't allow for this...
So arm kali 1.0.9 raspberry pi b+
How could I properly stop all networking services and achieve a wifi repeater functionality? maybe some examples?
Need help using WireShark.
in Questions
Posted
I did not watch the episode. But I will try to provide a quick set of instructions.
once you have Wireshark up and running and you see data flowing, you can filter out specific traffic... http example
try clicking on a specific packet, the bottom window you will see IP address and other specific information that you can filter through,in this window it's like a drop down menu continue to drop down until you find a specific string that you would like to filter. right click on the IP address and apply as filter, you can also right click the port number and click OR AND NOT SELECT
using this right click method you can learn the filtering language. you could copy this string and paste into the command line with other applications