tekapeks Posted February 29, 2012 Share Posted February 29, 2012 I'm running SET on my laptop and I'm using DNSspoof on the MK3. I dont have any problems redirecting traffic to my cloned website on my laptop. My problem is that the traffic doesnt get redirected to the real website after using any of the attacks of SET. Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted February 29, 2012 Share Posted February 29, 2012 Probably because your DNS spoof is taking the redirect hits. Quote Link to comment Share on other sites More sharing options...
tekapeks Posted March 1, 2012 Author Share Posted March 1, 2012 Its also what Im thinking but there is probably a way to go around that problem. Is there a way to sepecify the gateway in set so it redirect out to the internet after the attacks instead of looking for the real website on the pineapple network. Or do I have to change some config on the pineapple itself. I tried spoofing to the interface facing the internet on my laptop but same result. Quote Link to comment Share on other sites More sharing options...
tekapeks Posted March 4, 2012 Author Share Posted March 4, 2012 Anybody knows how to make this work??? Quote Link to comment Share on other sites More sharing options...
Mr-Protocol Posted March 4, 2012 Share Posted March 4, 2012 Is your pineapple doing the DNS spoofing? Is it spoofing the website to the pineapple or to the BackTrack machine? Either way it is going to be a matter of disabling the DNS spoof after the first hit. You can get crafty with iptables and make a custom rule to allow the redirect, or watch your SET terminal and then disable dns spoofing when you see activity. Even then it might not work if the DNS is cached. If someone has a solution for it, would be great to see it. But I'm unsure if there is one. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.