Jump to content

Fattman

Active Members
  • Posts

    7
  • Joined

  • Last visited

Recent Profile Visitors

495 profile views

Fattman's Achievements

Newbie

Newbie (1/14)

  1. Subterfuge has a good session hijack module and allows your to reduce the victims session from https to http. You can do it manually, by creating a MITM attack using Arpspoof, SSL Strip, Wireshark and Firefox addons Grease Monkey and Injection script for injecting the session cookie.
  2. Hi All, Wonder if anyone could help me please? I am currently trying to create a Web Attack Vector using SET Tools for setting up, but would like the reverse handle to respond within Armitage instead of Metasploit within SET Tools. The reason i would like the attack to appear in Armitage is because of its GUI and screen shots for my reports look better than a terminal shell. I have attempted to do so using Apache to host the spoofed site and have Armitage running the exploit and listener. But not sure how to bind the exploit to the Apache page. If anyone could point me in the right direction to do either of the above that would be a great help. Thanks Gary
  3. Thanks for the reply! I originally thought this, so installed the addon packs for the extra driver support. The reason i now think it is to do with the Distro is that USB 3 doesnt function when in live boot either. If it only happened on my laptop i would of thought thought that was the issue, but i have found the problem to occur when using USB 3 on any laptop. Does anyone else have issue with USB 3 support and BackTrack or am i the only one? lol
  4. Hi All, I am a 2nd year undergraduate studying Information Security. I have recently bought a new laptop to ensure i could run multiple virtual OS's and practice Pen Testing. The new lap top has only USB3 ports. I have created a virtual OS of BackTrack 5 r3 within Virtual Box and VM Player and get errors when trying to connect USB devices. When using: Virtual Box i have a UUID error. VM Player it says 'Driver in Use' I thought this was originally a Windows error from the Host OS, but have recently made a live boot on a USB drive. When within the Live boot i cannot access any USB devices. I have also tried the Live boot on another laptop which only has USB 3 ports and have the same problems. I know that the boot drive is fine and functional since it work perfectly on my old laptop which has USB 2 ports. Does any of the community know how i could sort this problem out or will i have to wait for a release of BackTrack which supports USB3? Thanks Gary
  5. thanks for the info, will take a look at this now. rgds gary
  6. thanks for the reply! I watched a webinar with James Lyne from Sophos Security presenting and he had set up a rogue AP which was getting devices to connect to him instead of their preferred APs. It worked the same way as the Pineapple but also had devices which used encryption such as WPA/WPA2 connecting to his rogue AP. Any idea what he would of used to do this? Reason i am asking is that i study Information Security and would like to do something around Wifi and its vulnerabilities for a dissertation. Will not be doing it until next year, but trying to get as much research done now so that i can make a start during the summer break. Thanks Gary
  7. Hi All Not sure if this is a silly question or not, so please bare with me. My Pineapple arrived today which i was very happy about. I have got it set up in my mini lab and wanted to start having a play about with it. I have 'MK4 Karma' enabled but after booting my vicitim machine the Pineapple failed to capture the device. My network has WPA2 Enrcyption. Will the Pineapple still be able to get the connection or must the victim device want to connect to a open network? After looking at what wifi APs are about i can see the spoofed SSID of my router, but the victim machine has still connected to my router and not the Pineapple. Any help would be appreciated! rgds Gary
×
×
  • Create New...