I'm still not giving up on my dream of seeing ettercap filters as one of the options comaX. How's that coming along?
Oh man... I am so f'ing swamped right now... I started writing a new version (and not update) of Yamas a while back but haven't had the time to do much on it... This year was supposed to be easier study-wise, but guess what? It absolutely is not. It's worse. If I get the time during the holidays I'll try to work on it, but I'm supposed to be preparing exams for early January.
I'll keep you guys posted.
Hi, first of all... awesome script !! Now, I was just wondering, is there is a way to know exactly from which IP address the logs are coming if you are poisoning a whole network? And is it possible to stop the ARP poisoning on just the selected IP, but continuing poisoning the whole network?
I am asking this because there a lots of SSL pages (like facebook or hotmail) that after running the script, they send to us the username and password information but the user is not able to correctly access them, for example in hotmail the user returns to the login page again and again, and in facebook the user can access to his account but it doesn't load properly.
So my idea was to stop the ARP poisoning on just the selected IP address once I got his credentials, so he will now be able to correctly access to all pages.
Of course I am not intending to do this for the wrong purposes, I just think that if you are going to test your network doing a MITM, you should do it right without anyone noticing what you are doing, even you have their authorization to do so.
Hi. The Script itś great, but since I use BT5R3 the scripts doesnt works fine.
Itś run smooth, but the password windows doesnt show anything. I'm triying facebook, twitter, gmail, etc. and nothing. anyone can help me? Thanks a lot.
i haven't tried this yet but does it work in the secure mode (https) ?
The "password" window is only saying
"Parsing /tmp/yamas.txt for credentials."
What does it mean?