![]() For example, when I attempt to access, I'd expect to be redirected to. I've tested by targeting multiple machines running different operating systems. Unfortunately, I've had little success in capturing redirecting an HTTPS connection to an HTTP one (which I presume SSLStrip should be doing for me). I am able to intercept and decode http packets just fine. ![]() ![]() and then clean up and examine results in Wireshark # This runs for a while,I then stop manually. Urlsnarf -i wlan0 | grep http > /root/session.txt Iptables -t nat -A PREROUTING -p tcp -destination-port 80 -j REDIRECT -to-port 10000 Wireshark (for examining post-test PCAP results) Ettercap (with the dns_spoof plugin enabled). I am using a combination of the following: In addition, I would like to employ a dns_spoof. I am attempting to perform a MitM-style attack from my machine (MacBook Pro running 64-Bit Kali), by means of ARP-poisoning the communication between my router and my targetted machine (a MacBook Air running OSX Mavericks) on my WLAN (WPA2-secured network).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |