aeiah Posted April 8, 2010 Share Posted April 8, 2010 (edited) my blog post regarding it the actual script depends on: linux iptables nat nmap ettercap (with iptables enabled in etter.conf) sslstrip it just gives you a list of available targets on your lan, sets things up and leaves you with ettercap for when passwords start showing up. let me know how you get on if anyone decides to use it. its not coded very beautifully but it works for me and ill try and get it working for others too. Edited April 30, 2010 by aeiah Quote Link to comment Share on other sites More sharing options...
ascorbic Posted April 16, 2010 Share Posted April 16, 2010 my blog post regarding it the actual script depends on: linux iptables nat nmap ettercap (with iptables enabled in etter.conf) sslstrip it just gives you a list of available targets on your lan, sets things up and leaves you with ettercap for when passwords start showing up. let me know how you get on if anyone decides to use it. its not coded very beautifully but it works for me and ill try and get it working for others too. Awesome, thanks for this, I can't wait to give it a try. Quote Link to comment Share on other sites More sharing options...
coldfire Posted April 18, 2010 Share Posted April 18, 2010 I´ve been trying to use your script and I run into some trouble, first, the nmap output that your script was using was differente from the output nmap was sending here (mine shows the latency, I'm using nmap v5.0) that was easy to solve. I've modifed the "issue" command to use the greppable output (-oG) and modified the "replace" command accordingly , after that I've noticied that the hostScan was never receiving any ip, the source of this problem was because using the "not in" comparison it was checking for the existence of a substring so a gateway 192.168.1.1 and an ip 192.168.1.105 would return false and this made the script fail to add any ip to the list. The solution is pretty simple, just replacing the "not in" to != was enough. Anyway, thanks for the great script, I hope I was able to help, and sorry for any english mistakes since it's not my primary language Quote Link to comment Share on other sites More sharing options...
aeiah Posted April 19, 2010 Author Share Posted April 19, 2010 I´ve been trying to use your script and I run into some trouble, first, the nmap output that your script was using was differente from the output nmap was sending here (mine shows the latency, I'm using nmap v5.0) that was easy to solve. I've modifed the "issue" command to use the greppable output (-oG) and modified the "replace" command accordingly , after that I've noticied that the hostScan was never receiving any ip, the source of this problem was because using the "not in" comparison it was checking for the existence of a substring so a gateway 192.168.1.1 and an ip 192.168.1.105 would return false and this made the script fail to add any ip to the list. The solution is pretty simple, just replacing the "not in" to != was enough. Anyway, thanks for the great script, I hope I was able to help, and sorry for any english mistakes since it's not my primary language thanks for the description of your changes. grabbing nmap output was bound to be a bit funky over different versions. ill look into making it more bullet proof in the coming days. by the sounds of things using -oG might simplify things. im not a regular user of nmap. do you fancy posting your modified script here or on my blog? Quote Link to comment Share on other sites More sharing options...
coldfire Posted April 20, 2010 Share Posted April 20, 2010 # find our targets nmapScan = issue('nmap', '-sP','-oG','-', gateway+'/24') hostScan = [] for line in nmapScan.splitlines(): if 'Host' in line: line = line.replace('Host: ','').replace(' () Status: Up','') if ip != line and gateway != line: hostScan.append(line) That's the modified function Quote Link to comment Share on other sites More sharing options...
aeiah Posted April 30, 2010 Author Share Posted April 30, 2010 # find our targets nmapScan = issue('nmap', '-sP','-oG','-', gateway+'/24') hostScan = [] for line in nmapScan.splitlines(): if 'Host' in line: line = line.replace('Host: ','').replace(' () Status: Up','') if ip != line and gateway != line: hostScan.append(line) That's the modified function thanks for that. curiously, ive got nmap v5.00 too, so i assume you were getting errors because of what the gateway was reporting. ive updated my script (located at the same location) with your amendments. hopefully this script will now be a bit more robust. Quote Link to comment Share on other sites More sharing options...
mada360 Posted October 4, 2010 Share Posted October 4, 2010 Is there any other file i need to edit to get this working? because at the moment it just returns an error saying the connection type hasn't been stated? Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.