Search the Community
Showing results for tags 'dnsmasqspoof'.
Found 2 results
I have been playing around with Evil Portal and dnsmasqspoof. However I am running into a issue. When I connect to my pineapple on my free_wifi ssid the spoof works for what I have set: 172.16.42.1 www.example.com example.com It redirects me to the captive portal. However I can't go to any other web addresses like www.google.com... When I connect to pineapple via SSH and run nslookup everything works fine I see the redirect and I see the google IP address. Just can't get to it via the safarai browser? Anybody got any suggestions? Thanks, Pete
Hi guys, Anyone know how I can get shell access in using any modern browsers (Chrome, IE, Firefox, etc. so that the browser doesn't bitch at me and say I need to upgrade to latest browser version) by browsing to a URL? I tried putting a malicious iframe on my evil portal and using these exploits: auxiliary/server/browser_autopwn, auxiliary/server/browser_autopwn2. I even tried downgrading to IE 8 then using the exploit: exploit/windows/browser/ms10_002_aurora. But so far I got nothing. :( No meterpreter sessions. This is for a presentation, by the way. Any of you guys suggest a different way? I am desperate. Wait not really. Just really frustrated. Hope someone can help. Thanks in advance!