Jump to content

i8igmac

Dedicated Members
  • Posts

    939
  • Joined

  • Last visited

  • Days Won

    22

Posts posted by i8igmac

  1. I did not watch the episode. But I will try to provide a quick set of instructions.

    once you have Wireshark up and running and you see data flowing, you can filter out specific traffic... http example

    try clicking on a specific packet, the bottom window you will see IP address and other specific information that you can filter through,in this window it's like a drop down menu continue to drop down until you find a specific string that you would like to filter. right click on the IP address and apply as filter, you can also right click the port number and click OR AND NOT SELECT

    using this right click method you can learn the filtering language. you could copy this string and paste into the command line with other applications

  2. Makes sense as the HTML source code probably comes in several packets. If you are able to choose what to replace you could search for comments (i.e. with regular expression), cut them out, inject your code and fill it up until the original size is restored. This might be a little workaround without making too much damage to the website itself.

    I do remember doing exactly what u said... but I feel that all the problems you will find, there is a cleaner way to handle this...

    Its all about success rate... lets say ettercap fails 30% of the time to provide clean content modification, a small proxy will get you closer to 95% successful and clean content (my testing years ago)

  3. http://l33ttutorials.wordpress.com/2014/02/20/tutorial-man-in-the-middle-attack-using-sslstrip-and-arpspoofing-with-kali-linux/

    Read this, vm installs or hd installs of kali may cause issues i guess

    Edit;

    Its just ettercaps ugly ways lol one day it works another day your like wtf... this frustration is why I wrote a proxy to do the data swap. . . Im sure its a small step you are missing...

    Arpspoof

    Dnsspoof

    And a proxy kungfoo replaces ettercap...

    Ettercap -T -q -f filter -M ARP // //

    Its been a few years since I used ettercap

    Edit;

  4. 100% reliable proxy written in your choice for the basic framework that suports https aswell, then each exploit could be a plugin

    If the GET request includes('*.exe') then launch the basic-plugin.rb for the swapping function that meets these if statements... mod the content length andd swap the data

    Plugins could be the language of your choice, simply handle the specific request and provide a response design for that exploit

  5. can you test this inside the local network... don't involve the router and port forwarding just yet...

    when I run into these kinds of problems ill start my test with netcat to duplicate the task with hi world examples...

    You have one machine(192.168.0.101) listening on a port that provides console access

    nc -l -p 22

    And machine two(192.168.0.102) connecting to the first machine with intentions of using the console service

    Nc 192.168.0.102 22

    And then test that the connection works by typing 'hi world from machine2'

    At this point you know that anything can now be accomplished threw this tcp stream...

    so you want a connect back? your machine 1 connects to machine 2 on port 3333 and slides in the data existing on port 22?

    I can help you recreate this, at the moment I'm away from my puters

    So if you interested, look online for ssh pipe with netcat. I have found better luck with pipes abd nc

  6. I have built yagi's and biquad's, I was not that impressed... if you include a parabolic rear reflector in your build then you will experience HUGE gain

    I can play online first person shooters with no lag... extremely long distance threw walls and trees.

    If you need a a pig tail, I opened up a detachable antenna, spliced on a barrel connector that will fit most coax cable connectors the dish network guys leave behind

    I have example videos on youtube if you are interested

  7. http://www.amazon.com/gp/aw/d/B00FDER07E?cache=4672baed590b3f9e6eff8892dc7946caπ=AC_SX110_SY165_QL70&qid=1410374520&sr=8-8#ref=mp_s_a_1_8

    So, i am looking to complete the build on my raspberry pi b+, i hope to get some bang out of my buck.

    alfa card

    Battery

    i seek guidance on purchasing a proper battery in the 30$ range. I plan to run 2 wifi cards... from what I read, I should not need a powered usb hub with model b+ ???

    Then my gut says get the alfa awus036h. What about other models? should i go with the model that supports karma?

  8. Very strange. Is this something you may have configured in the AP, that it either doesn't broadcast or broadcasts less often (trying to be hidden or whatever)?

    Its ddwrt repeater... no other machine acts this way... this is a service issue. I will test other wifi router befor i rule this out

    /etc/networkig/interfaces

    Wlan0 manual

    mon0 manual

    From what i understand, this would tell networking service not to bothere with the device

    soak

    I did start a ping process that does not print stdout. Funny story

  9. it seems to be the network services are not what im used to... wheeze? ugly? nasty? stupid?

    service network stop

    service network-manager stop

    iwconfig wlan0 essid mywifi

    dhclient wlan0

    seems that i can ping google.com... If i stop pinging google then not long after ill see this error in dmesg

    ieee80211 phy0: wlan0: No probe response from AP 02:1c:10:4e:2f:5c after 500ms, disconnecting

    Do your wifi and ethernet get IP addresses from separate subnets? Maybe the routing rules don't add up.

    been at this for 3 days now over ssh... so at this point i have ethernet unplugged, hdmi is now pluged in and i got my keyboard out... daunting task...

    i guess ill start a backgroud process of a ping google LOL what a joke

    :shoots_his_brains_out: :blink:

  10. this has been frustrating... I can't get my wifi card to stay connected to my wifi or ping google... I have ethernet pluged into the device so I can ssh to the pi root@192.168.70.135

    Iwconfig wlan0 essid mywifi

    Dhclient

    My attempt to connect does not work for long.

    Nmap -e wlan0 -sP 192.168.70.1 google.com

    Resaults: 192.168.70.1 responds but google fails

    And not long after wlan0 disconnects

    ieee80211 phy0: wlan0: No probe response from AP 02:1c:10:4e:2f:5c after 500ms, disconnecting

    I feel that because im connected by eth0 at the start, this may prevent wlan0 from becoming associated

  11. Maybe someone could confirm or correct what I have here...

    plug the wifi card in to start with a blank canvass... testing with kali arm raspbery image

    service network-manager stop
    pkill wpa-supplicant
    pkill dhclient
    Iwconfig wlan0 essid my-wifi
    Dhclient wlan0
    Services that may interfere are properly stopped? Connection with my-wifi established

    Ifconfig wlan0 down
    Iwconfig wlan0 mode monitor
    ifconfig wlan0 up
    At this point you should be able to ping other devices on the network threw wlan0 with nmap... you are now established in monitor mode...

    airbase-ng wlan0 -P -C 60
    Now you are almost set. All that is left is iptables and dns masq to hand out ip's to the clients to forward traffic... you should not see any errors, channel -1errors

    and now cinfigure iptables and dnsmasq

    iptables --flush && iptables --table nat --flush && iptables --delete-chain && iptables --table nat --delete-chain
    iptables --table nat --append POSTROUTING --out-interface wlan0 -j MASQUERADE
    iptables --append FORWARD --in-interface at0 -j ACCEPT
    echo 1 > /proc/sys/net/ipv4/ip_forward
    echo 'dhcp-range=192.168.96.50,192.168.96.150,12h' > /etc/dnsmasq.conf
    ifconfig at0 192.168.96.1 up
    pkill dnsmasq
    dnsmasq
    You should have a karma like fake ap running on your kali linux machine with working internet from one wifi device... i may need help correcting the iptables...
  12. Im curious, at my house i see in airodump 3 device and one of them is open and essid is xfinitywifi.

    12:aa:bb:cc:dd:ee essid xfinitywifi open

    13:aa:bb:cc:dd:ee

    14:aa:bb:cc:dd:ee

    almost exact same mac address... are these access points outside on a phone pole? Maybe a stupid question lol

  13. on linux mint and kali running on my labtop I can connect to my home network and then run airbase-ng to broadcast another wifi essid...

    so. While my wifi card is connected to my home ap ill set the card to monitor made and place the card on the same channel and start airbase mon0 -P -C 60 -c 6

    Iwconfig wlan0 mode monitor

    Iwconfig wlan0 channel 6

    Airbase-ng wlan0 -e free-wifi

    with dns configured and iptables i now have a working repeater/fake-ap or what ever you want to call it

    Now my question is I would like to understand why these services running on gnome kali and gnome mint don't interfere with the task above but other linux os networking service don't allow for this...

    So arm kali 1.0.9 raspberry pi b+

    How could I properly stop all networking services and achieve a wifi repeater functionality? maybe some examples?

×
×
  • Create New...