Search the Community
Showing results for tags 'mitm'.
-
[Hidden Content] NOTE : THE TOOL IS NOT MINE, I AM JUST SHARING IT FOR EDUCATIONAL PURPOSE.
-
SKA - Simple Karma Attack SKA allows you to implement a very simple and fast karma attack. You can sniff probe requests to choice the fake AP name or, if you want, you could insert manually the name of AP (evil twin attack). When target has connected to your WLAN you could active the HTTP redirection and perform a MITM attack. Details The script implements these steps: selection of NICs for the attack (one for LAN and one for WAN) capture of probe-requests to choice the fake AP name (tcpdump) activation of fake AP (hostapd and dnsmasq) the new AP has a DHCP server which provides a valide IP to the target and prevents possible alerts on the victim devices activation of HTTP redirection (iptables) only HTTP requests are redirect to fake site, while the HTTPS traffic continues to route normally activation of Apache server for hosting the phising site at the end of the attack the script cleans all changes and restores Apache configuration Screenshots FAQ SKA alerts you if there are some problems with NetworkManager demon or Apache configuration file. Anyway you could find the answers to your problems in the links below:[Hidden Content] In summary Disable DNS line in your NetworkManager configuration file (look into /etc/NetworkManager/): #dns=dnsmasq Insert the MAC of your wireless adapter between the unmanaged devices to allow hostapd works properly: unmanaged-devices=mac:XX:XX:XX:XX:XX:XX Source && Download [hide][Hidden Content]]
-
- 1
-
- mitm
- karma-attack
- (and 4 more)
-
Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials. It was developed to raise awareness and educate about the importance of properly configured RDP connections in the context of pentests, workshops or talks. The author is Adrian Vollmer (SySS GmbH). Disclaimer Use at your own risk. Do not use without full consent of everyone involved. For educational purposes only. [HIDE][Hidden Content]]
-
[Hidden Content]
-
Exploits Mac OS X libxpc MITM Privilege Escalation
1337day-Exploits posted a topic in Updated Exploits
This Metasploit module exploits a vulnerability in libxpc on macOS versions 10.13.3 and below. The task_set_special_port API allows callers to overwrite their bootstrap port, which is used to communicate with launchd. This port is inherited across forks: child processes will use the same bootstrap port as the parent. By overwriting the bootstrap port and forking a child processes, we can now gain a MitM position between our child and launchd. To gain root we target the sudo binary and intercept its communication with opendirectoryd, which is used by sudo to verify credentials. We modify the replies from opendirectoryd to make it look like our password was valid. View the full article-
- escalation
- privilege
-
(and 3 more)
Tagged with: