- This topic has 25 replies, 2 voices, and was last updated 4 years ago by
Diego Pérez.
- AuthorPosts
- January 24, 2021 at 10:31 am #51381
akademikane
ParticipantHi, when I run ettercap all devices get disconnected, why ? I think no tool is working.
January 24, 2021 at 10:33 am #51382akademikane
ParticipantJanuary 24, 2021 at 10:35 am #51383akademikane
ParticipantJanuary 24, 2021 at 10:35 am #51384akademikane
ParticipantJanuary 24, 2021 at 10:37 am #51385January 25, 2021 at 6:42 pm #51437Diego Pérez
ModeratorHi!
It looks like it should work fine, have you tested it in the virtual lab? is it working?let’s try it in a simplest scenarion first.
Let me know.
DiegoJanuary 25, 2021 at 8:38 pm #51441akademikane
ParticipantI tried it in Virtual box windows 7 and 8, that is no working.
January 26, 2021 at 6:22 pm #51485Diego Pérez
ModeratorHi!
Can you show the results of:
ifconfig and route -n in kali
ipconfig in windows (I mean windows vm)
Can you share a screenshot of the Network settings used in VirtualBox for both machines?And tere’s no need for the wireless adapter, just don’t plug it in.
Thanks!
DiegoJanuary 26, 2021 at 9:11 pm #51494akademikane
ParticipantWhy do I need to send you windows vm ? My wish is to attack real machines and not virtual machines.
I want to attack my windows 8 which is a real one in my laptop.
I also wanted to attack my iphone which is a real machine.January 26, 2021 at 9:38 pm #51495akademikane
ParticipantJanuary 26, 2021 at 9:39 pm #51497akademikane
ParticipantI don’t want to run on VMs but I want to run on real machines, if you have any idea what to do let me know I need it.
January 27, 2021 at 6:44 pm #51520Diego Pérez
ModeratorHi!
You can’t run before you learn to walk, what I mean is that we have to test it on a simpler scenario and then move on to a more complex one. So I’ll suggest to do it as mentioned in the course and test it first in the virtual lab, and as you mentioned that it’s not even working in the virtual lab we need to see what’s going on there.So set up the virtual machines and send the requested info.
Greetings!
DiegoJanuary 28, 2021 at 12:12 am #51534akademikane
ParticipantHey Diego I tried to install it but I can’t because It doesn’t start working. I don’t have enough ram.
My laptop shuts down.
Is there any other way we can try, or perhaps Zaid ?
January 28, 2021 at 6:34 pm #51564Diego Pérez
ModeratorHi!
Look, when trying it in a real network there are many things that can go wrong and it would be difficult to debug if you haven’t even tested it in the simplest scenario. You have mentioned that it didn’t work in the virtual lab, so how did you test it if you are not able to run 2 virtual machines?
Also I have noticed something, you have directed all the packets to port 10000 but I can’t see if you have started sslstrip.So to test it in the simplest scenario flush iptables and don’t use sslstrip nor any iptables rule:
iptables –flush
iptables –table nat –flush
iptables –delete-chain
iptables –table nat –delete-chain
iptables -P FORWARD ACCEPTEnable port forwarding
echo 1 > /proc/sys/net/ipv4/ip_forwardThen run the arp spoof attack again. Are you able to sniff dta from http site like:
http://testphp.vulnweb.com/login.php
Let me know.
DiegoJanuary 29, 2021 at 9:18 am #51582akademikane
ParticipantNo I can’t sniff data Diego, when I attack the device, I can go to every website there, facebook.com google.com, nothing stops me, when I go to http://testphp.vulnweb.com/login.php i type username and password I don’t see it there.
- AuthorPosts
- You must be logged in to reply to this topic.