Jump to content

Set Sessions


singh763173
 Share

Recommended Posts

Afternoon all,

Quick question for you guys - I have tried to spawn multiple SET instances on a single box and I dont believe it appears to be working. Is this actually possible?

I am spoofing sites successfully and it binds it to port 80 but say I wanted to spoof site b and site c at at the same time and wanted to bind it to port 81 and 82 (port numbers irrelevant) - can this be done? If so how? Or if not, can SET be used to download the spoof site so that it can be hosted manually and then the wifi pineapple can just point to the machine hosting the sites and virtualhosts be put in place to redirect depending on URL?

(didnt post in the jasager forums as this isnt really a jasager issue)

Am i making sense?

Thanks

Link to comment
Share on other sites

Dave has an IRC channel just for SET, where people on there might be able to help with this question more.

https://www.secmaniac.com/blog/2011/07/20/new-irc-channel-launches-for-the-social-engineer-toolkit-set/

I know dave had added something for a SET interactive shell in the newer versions, but I've only ever dabbled with SET and not really used it enough to get into all of its features.

Link to comment
Share on other sites

I've heard of running two instances of Apache of different ports but don't have much personal experience with it, I'm sure if you google it'll turn something up.

Otherwise you could try to run one instance of the Apache server on port 80 and go into set_config and run the python server on a different port.

Or you could try to host all the spoofed sites on the same server but in different directories, so you can point to each of them as if they were their own.

Link to comment
Share on other sites

I've heard of running two instances of Apache of different ports but don't have much personal experience with it, I'm sure if you google it'll turn something up.

Otherwise you could try to run one instance of the Apache server on port 80 and go into set_config and run the python server on a different port.

Or you could try to host all the spoofed sites on the same server but in different directories, so you can point to each of them as if they were their own.

You can change Apache's default (TCP 80) port in the config file to anything you like it.

Link to comment
Share on other sites

Yeah but how would he run 2 or more instances of Apache (presumably using the same config file) on different ports?

Is it possible to run to instance of Apache, here is a how to

http://wiki.apache.org/httpd/RunningMultipleApacheInstances

Link to comment
Share on other sites

You could try vhosts too, see if that works, but not sure how SET will handle all of that. Seriously though, check out their IRC channel. Someone there might have already asked this question or might be something they could add to future versions.

Link to comment
Share on other sites

Thanks boys, really appreciate your help! I will defo check out the IRC.

If on the off chance it cant be done, can you guys suggest a cloning tool that can download "the main stuff". A script can be written in the backend to capture the credentials and so on.

Just so that your aware... this is not for malicious purposes but purely for educating myself aswell as others in the possibilities of such actions.

Cheers!

Link to comment
Share on other sites

Thanks boys, really appreciate your help! I will defo check out the IRC.

If on the off chance it cant be done, can you guys suggest a cloning tool that can download "the main stuff". A script can be written in the backend to capture the credentials and so on.

Just so that your aware... this is not for malicious purposes but purely for educating myself aswell as others in the possibilities of such actions.

Cheers!

If you are already on the same network as the victim, Ettercap or wireshark and any other MITM tools, SSl strip + MITM, Hamster+Ferrt, etc

Edited by digip
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...