Jump to content

dustbyter

Active Members
  • Posts

    360
  • Joined

  • Last visited

  • Days Won

    7

Posts posted by dustbyter

  1. Stanly,

    Just keep in mind that sometimes the question has to be pretty specific because just asking how i can do a MITM is vague.

    Once you have your pineapple deployed and people connect to your network, well you have MITM'ed them. You own the network, thus you can then perform any activity you wish. The infusions are tools that can be used now that you are in the middle.

    Also, remember the OSI Model and layers. If your testing scope includes compromising an SSL connection, well this is a MITM at a different layer in the OSI model than just the attack you are performing on the network itself.

    Hope this helps, but specifically if your goal is to get your testing devices to connect to your device, then this can be accomplished using the techniques that bytedeez talked about.

  2. Hey WM,

    I was able to reproduce the following today as well. The rule was removed, but it wasn't. Let me explain below....

    The infusion is already deleting the rules when you hit the stop button, so you don't need to change anything yourself. However, I will make sure that it's still working correctly in latest version of the firmware.

    As a general matter of fact, I recommend, to avoid changing infusions yourself, otherwise it's getting very difficult for infusion dev to provide any support ! I suggest to get in contact with the dev by PM and suggest the modifications, which could then be integrated into next version.

    EDIT:

    I've checked again and it's working correctly, the rules are correctly deleted by the infusion:

    root@Pineapple:~# iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
    root@Pineapple:~# iptables -t nat --line-numbers -n -L | grep 80 | grep 10000
    2    REDIRECT   tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80 redir ports 10000 
    root@Pineapple:~# iptables -t nat -D PREROUTING 2
    root@Pineapple:~# iptables -t nat --line-numbers -n -L | grep 80 | grep 10000 | awk {'print $1'}
    root@Pineapple:~# 

    1. I dumped my info from iptables prior to starting sslstrip infusion. Everything looks ok.

    root@Pineapple:~# iptables -t nat --line-numbers -n -L
    Chain PREROUTING (policy ACCEPT)
    num  target     prot opt source               destination         
    1    delegate_prerouting  all  --  0.0.0.0/0            0.0.0.0/0           
    
    Chain INPUT (policy ACCEPT)
    num  target     prot opt source               destination         
    
    Chain OUTPUT (policy ACCEPT)
    num  target     prot opt source               destination         
    
    Chain POSTROUTING (policy ACCEPT)
    num  target     prot opt source               destination         
    1    MASQUERADE  all  --  172.16.42.0/24       0.0.0.0/0           
    2    delegate_postrouting  all  --  0.0.0.0/0            0.0.0.0/0           
    
    Chain delegate_postrouting (1 references)
    num  target     prot opt source               destination         
    1    postrouting_rule  all  --  0.0.0.0/0            0.0.0.0/0           /* user chain for postrouting */ 
    2    zone_lan_postrouting  all  --  0.0.0.0/0            0.0.0.0/0           
    3    zone_wan_postrouting  all  --  0.0.0.0/0            0.0.0.0/0           
    4    zone_usb_postrouting  all  --  0.0.0.0/0            0.0.0.0/0           
    5    zone_wan2_postrouting  all  --  0.0.0.0/0            0.0.0.0/0           
    
    Chain delegate_prerouting (1 references)
    num  target     prot opt source               destination         
    1    prerouting_rule  all  --  0.0.0.0/0            0.0.0.0/0           /* user chain for prerouting */ 
    2    zone_lan_prerouting  all  --  0.0.0.0/0            0.0.0.0/0           
    3    zone_wan_prerouting  all  --  0.0.0.0/0            0.0.0.0/0           
    4    zone_usb_prerouting  all  --  0.0.0.0/0            0.0.0.0/0           
    5    zone_wan2_prerouting  all  --  0.0.0.0/0            0.0.0.0/0           
    
    Chain postrouting_lan_rule (1 references)
    num  target     prot opt source               destination         
    
    Chain postrouting_rule (1 references)
    num  target     prot opt source               destination         
    
    Chain postrouting_usb_rule (1 references)
    num  target     prot opt source               destination         
    
    Chain postrouting_wan2_rule (1 references)
    num  target     prot opt source               destination         
    
    Chain postrouting_wan_rule (1 references)
    num  target     prot opt source               destination         
    
    Chain prerouting_lan_rule (1 references)
    num  target     prot opt source               destination         
    
    Chain prerouting_rule (1 references)
    num  target     prot opt source               destination         
    
    Chain prerouting_usb_rule (1 references)
    num  target     prot opt source               destination         
    
    Chain prerouting_wan2_rule (1 references)
    num  target     prot opt source               destination         
    
    Chain prerouting_wan_rule (1 references)
    num  target     prot opt source               destination         
    
    Chain zone_lan_postrouting (1 references)
    num  target     prot opt source               destination         
    1    postrouting_lan_rule  all  --  0.0.0.0/0            0.0.0.0/0           /* user chain for postrouting */ 
    
    Chain zone_lan_prerouting (1 references)
    num  target     prot opt source               destination         
    1    prerouting_lan_rule  all  --  0.0.0.0/0            0.0.0.0/0           /* user chain for prerouting */ 
    
    Chain zone_usb_postrouting (1 references)
    num  target     prot opt source               destination         
    1    postrouting_usb_rule  all  --  0.0.0.0/0            0.0.0.0/0           /* user chain for postrouting */ 
    2    MASQUERADE  all  --  0.0.0.0/0            0.0.0.0/0           
    
    Chain zone_usb_prerouting (1 references)
    num  target     prot opt source               destination         
    1    prerouting_usb_rule  all  --  0.0.0.0/0            0.0.0.0/0           /* user chain for prerouting */ 
    
    Chain zone_wan2_postrouting (1 references)
    num  target     prot opt source               destination         
    1    postrouting_wan2_rule  all  --  0.0.0.0/0            0.0.0.0/0           /* user chain for postrouting */ 
    2    MASQUERADE  all  --  0.0.0.0/0            0.0.0.0/0           
    
    Chain zone_wan2_prerouting (1 references)
    num  target     prot opt source               destination         
    1    prerouting_wan2_rule  all  --  0.0.0.0/0            0.0.0.0/0           /* user chain for prerouting */ 
    
    Chain zone_wan_postrouting (1 references)
    num  target     prot opt source               destination         
    1    postrouting_wan_rule  all  --  0.0.0.0/0            0.0.0.0/0           /* user chain for postrouting */ 
    2    MASQUERADE  all  --  0.0.0.0/0            0.0.0.0/0           
    
    Chain zone_wan_prerouting (1 references)
    num  target     prot opt source               destination         
    1    prerouting_wan_rule  all  --  0.0.0.0/0            0.0.0.0/0           /* user chain for prerouting */ 
    

    2. I start sslstrip and then check the iptables again. We can see the redirect added by sslstript.

    root@Pineapple:~# iptables -t nat --line-numbers -n -L | grep 80
    2    REDIRECT   tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80 redir ports 10000 
    

    3. I clicked stop through the infusion, it should have removed all redirects of tcp port 80 to 10000. But it has not. Instead the number has just changed to 1 from 2.

    root@Pineapple:~# iptables -t nat --line-numbers -n -L | grep 80
    1    REDIRECT   tcp  --  0.0.0.0/0            0.0.0.0/0           tcp dpt:80 redir ports 10000 
    

    4. I had to run in command line "root@Pineapple:~# iptables -t nat -D PREROUTING 1" to remove the record.

    Hope this helps for you to figure out the issue.

  3. Hey newbi3,

    I'll have to start up that pineapple. I'll try to get it to you in the next day or so.

    You just need the nodogsplash.conf file, because there is the actual splash screen that goes in the nodogsplash install directory and then the site you get redirected after in the /www/x/ directory.

  4. I experimented a bit with this and was able to get it to work. Didn't have to really change much. I did have some settings updated in the nodogsplash conf also. I would have to check on what they were exactly.

    The only issue i really saw was that on the initial screen that said click here to connect... the image being loaded did not display correctly.

  5. manlyhak,

    I haven't checked facebook and others, but my guess is that they are now using HSTS to set the HTTP Strict Transport Security, this tells the browser to ensure that all the links to it are over HTTPS.

    I think SSL-SPLIT was created to alleviate some of this, but it would have a warning popup on the browser because of the invalid certificate, regarding SSLSTRIP, I think at Defcon sensepost modified it to work with hsts. We will have to see what those changes are and when they will be available on the pineapple's version of sslstrip.

  6. Missed this presentation while at Defcon, but reading through the presentation, slide 25 seems to be describing the PineAP functionality... rebroadcasting the probed requests.

  7. Got a hold of a 6800 juice. Trying to figure out if the battery is good or not.

    When I got it, it was about 75% full. Used if for several hours and am now trying to charge it. The switch is "on" and it is plugged in to charge.

    Is the LED on the side with the on/off switch always RED? Should it change color when charging? Hoping a manual exists for this battery.

×
×
  • Create New...