Jump to content

Recommended Posts

Posted

I'm running SET on my laptop and I'm using DNSspoof on the MK3. I dont have any problems redirecting traffic to my cloned website on my laptop. My problem is that the traffic doesnt get redirected to the real website after using any of the attacks of SET.

Posted

Its also what Im thinking but there is probably a way to go around that problem. Is there a way to sepecify the gateway in set so it redirect out to the internet after the attacks instead of looking for the real website on the pineapple network. Or do I have to change some config on the pineapple itself. I tried spoofing to the interface facing the internet on my laptop but same result.

Posted

Is your pineapple doing the DNS spoofing? Is it spoofing the website to the pineapple or to the BackTrack machine?

Either way it is going to be a matter of disabling the DNS spoof after the first hit. You can get crafty with iptables and make a custom rule to allow the redirect, or watch your SET terminal and then disable dns spoofing when you see activity.

Even then it might not work if the DNS is cached. If someone has a solution for it, would be great to see it. But I'm unsure if there is one.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...