- January 24, 2021 at 10:31 am #51381
Hi, when I run ettercap all devices get disconnected, why ? I think no tool is working.
January 24, 2021 at 10:33 am #51382January 24, 2021 at 10:35 am #51383January 24, 2021 at 10:35 am #51384January 24, 2021 at 10:37 am #51385January 25, 2021 at 6:42 pm #51437
It looks like it should work fine, have you tested it in the virtual lab? is it working?
let’s try it in a simplest scenarion first.
Let me know.
DiegoJanuary 25, 2021 at 8:38 pm #51441
I tried it in Virtual box windows 7 and 8, that is no working.January 26, 2021 at 6:22 pm #51485
Can you show the results of:
ifconfig and route -n in kali
ipconfig in windows (I mean windows vm)
Can you share a screenshot of the Network settings used in VirtualBox for both machines?
And tere’s no need for the wireless adapter, just don’t plug it in.
DiegoJanuary 26, 2021 at 9:11 pm #51494
Why do I need to send you windows vm ? My wish is to attack real machines and not virtual machines.
I want to attack my windows 8 which is a real one in my laptop.
I also wanted to attack my iphone which is a real machine.January 26, 2021 at 9:38 pm #51495January 26, 2021 at 9:39 pm #51497
I don’t want to run on VMs but I want to run on real machines, if you have any idea what to do let me know I need it.January 27, 2021 at 6:44 pm #51520
You can’t run before you learn to walk, what I mean is that we have to test it on a simpler scenario and then move on to a more complex one. So I’ll suggest to do it as mentioned in the course and test it first in the virtual lab, and as you mentioned that it’s not even working in the virtual lab we need to see what’s going on there.
So set up the virtual machines and send the requested info.
DiegoJanuary 28, 2021 at 12:12 am #51534
Hey Diego I tried to install it but I can’t because It doesn’t start working. I don’t have enough ram.
My laptop shuts down.
Is there any other way we can try, or perhaps Zaid ?January 28, 2021 at 6:34 pm #51564
Look, when trying it in a real network there are many things that can go wrong and it would be difficult to debug if you haven’t even tested it in the simplest scenario. You have mentioned that it didn’t work in the virtual lab, so how did you test it if you are not able to run 2 virtual machines?
Also I have noticed something, you have directed all the packets to port 10000 but I can’t see if you have started sslstrip.
So to test it in the simplest scenario flush iptables and don’t use sslstrip nor any iptables rule:
iptables –table nat –flush
iptables –table nat –delete-chain
iptables -P FORWARD ACCEPT
Enable port forwarding
echo 1 > /proc/sys/net/ipv4/ip_forward
Then run the arp spoof attack again. Are you able to sniff dta from http site like:
Let me know.
DiegoJanuary 29, 2021 at 9:18 am #51582
- You must be logged in to reply to this topic.