tekapeks Posted February 29, 2012 Posted February 29, 2012 I'm running SET on my laptop and I'm using DNSspoof on the MK3. I dont have any problems redirecting traffic to my cloned website on my laptop. My problem is that the traffic doesnt get redirected to the real website after using any of the attacks of SET. Quote
Mr-Protocol Posted February 29, 2012 Posted February 29, 2012 Probably because your DNS spoof is taking the redirect hits. Quote
tekapeks Posted March 1, 2012 Author Posted March 1, 2012 Its also what Im thinking but there is probably a way to go around that problem. Is there a way to sepecify the gateway in set so it redirect out to the internet after the attacks instead of looking for the real website on the pineapple network. Or do I have to change some config on the pineapple itself. I tried spoofing to the interface facing the internet on my laptop but same result. Quote
tekapeks Posted March 4, 2012 Author Posted March 4, 2012 Anybody knows how to make this work??? Quote
Mr-Protocol Posted March 4, 2012 Posted March 4, 2012 Is your pineapple doing the DNS spoofing? Is it spoofing the website to the pineapple or to the BackTrack machine? Either way it is going to be a matter of disabling the DNS spoof after the first hit. You can get crafty with iptables and make a custom rule to allow the redirect, or watch your SET terminal and then disable dns spoofing when you see activity. Even then it might not work if the DNS is cached. If someone has a solution for it, would be great to see it. But I'm unsure if there is one. Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.