Jump to content

Search the Community

Showing results for tags 'dnsspoof'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapple University
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
  • Hak5 Shows
    • Hak5
    • HakTip
    • Metasploit Minute
    • Threatwire
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 6 results

  1. Module: DNSspoof Version: 1.3 Features: Manage dependencies Configure hosts file Live output Run History Change log: 1.3 Bug fixes
  2. Hi all, I'm trying to spoof dns in a static network based on the original script. So far, I've spent hours on it without any results - and I don't know why... From my understanding, I would have to do it as such: Let's say I have a network in 192.168.1.0/24 with one router in 192.168.1.1 and my host is 192.168.1.50. 1) set a static IP on eth0 which mimics the router (example: 192.168.1.1) --> uci set network.lan.ipaddr="192.168.1.1" 2) set a static IP on eth1 which mimics my host on the network (example: 192.168.1.50) --> uci set network.wan.ipaddr="192.168.1.50" And then let the script do it's own stuff with the dnsmasq address and the iptables. The whole script would look like this: #!/bin/bash function setup(){ uci set network.lan.ipaddr="192.168.1.1" uci set network.wan.ipaddr="192.168.1.50" sleep 5 cp $(dirname ${BASH_SOURCE[0]})/spoofhost /tmp/dnsmasq.address &> /dev/null /etc/init.d/dnsmasq restart } function run(){ iptables -A PREROUTING -t nat -i eth0 -p udp --dport 53 -j REDIRECT --to-port 53 } setup run
  3. having a few problems with the wifi pineapple nano. I have set it all up and it seems to be okay with regards to scanning as it is pulling networks back as it should. However there are a couple problems I am encountering which I am loosing the will to live over! 1) I have downloaded the DNSspoof module. I am trying to make it so that I can direct a specific host trying to get to a specific website redirected to a webpage of my choice, or even better a website that I have created (knocked up for educational purposes) however I cannot seem to update any of the details on the module. every time I click save on the landing page, I click out and go back in and its what it was before , which was a <b>hello you</b> just to test if it works. so now I cannot change this, even after saving? it also has trouble running, when I click start it says starting then flips back to start again. if anyone knows why or even a worrkaround that would be great. 2) generic settings are getting saved, I have mounted the sd card, I have ssh into the nano and can see the card there and I can write files to it. however when I save a configuration such as in the pineAP, as soon as I log off or go to another pane it goes back to defaults, i.e nothing checked, I can't find any updated files on SD card. I am wondering if it saves internally for the first time that I configured the system to a point and keeps using that as a start up point for every time I go into it now? again if anyone knows anything surrounding these issues, I'm all ears as I'm pretty lost and ran out of ideas, already been through a factory reset.
  4. Just curious if its possible to use the Social Engineering Toolkit with the Wifi Pineapple. Here is what i am thinking about but due to my hardware limitations at the moment and my friend who i test this stuff with is on holiday with his family i can not test this legally and i would never break the law so right now i am unable to test this out and i keep thinking about it and the more i think about it the more i want to know if its possible. I have say a Wifi Pineapple Nano or Tetra as it doesn't matter which one and a laptop running Kali Linux with the Social Engineering toolkit installed. I use SET to clone say facebook as an example (before my hardware limitations as was able to use evil portal to do the same thing but i have never tried it this way before). So i have my pineapple plugged in and it is up and running with no errors to my computer running SET with facebook as my example. On the pineapple i run dnsspoof to make sure that anyone connected to my pineapple the tries to go to "facebook" is redirected to my kali machine running my SET server. Now since they are connected to my network via the pineapple when using the dnsspoof module i should only need to spoof the internal IP address of my kali machine which SET is running, right? Is this possible? As i said i can't test this out yet but i am very curious. Thanks guys
  5. Hi, I m new to pentesting. I have got my pineapple nano last month. i have been learning by watching tutorials available on internet since then. Most of the material available is related to the nano's predecessors. And i have found that some of them dont work anymore or i m not being guided appropriately. Modules like SSLsplit, DNSspoof, DNSMasq Spoof, Evil portal etc dont seem to work anymore. Like SSLsplit and DNSMasq dont seem to work in case of https sites. On browsers like chrome, firefox etc. the sites like facebook, gmail, etc. dont even open when i try to dnsspoof, and secondly the data is still encrypted after using sslsplit. Infact we just cant open the site without https. So i needed to know that after the implementation of HSTS, have these modules become completely useless??? or is there some way around using them? P.S. I m a newbie so please guide me thoroughly.. :)
  6. just got the nano it works great i have had many pineapple but this one is the best Love The Phone app however when do we get the modules it says coming soon i cant use any of the other cool functions outside the old modules standalone ssl strip and the many cool apps just want to know when this will be updated so i can have more fun Thanks !
×
×
  • Create New...