Page 3 of 15 FirstFirst 1234513 ... LastLast
Results 21 to 30 of 144

Thread: [Script] [Video] fakeAP_pwn (v0.3)

  1. #21
    Member
    Join Date
    Feb 2009
    Location
    0,0
    Posts
    90

    Default Re: [Script] [Video] fakeAP_pwn (v0.3)

    Quote Originally Posted by joker5bb View Post
    how did you compile hostapd?
    I'm somewhat in the same boat as I just installed hostapd and then ran the fakeAP_pwn script. What I did notice is that it says:

    Code:
    [>] Starting: Access point
    'Fake' Access Point~hostapd /tmp/fakeAP_pwn.hostapd
    Configuration file: /tmp/fakeAP_pwn.hostapd
    Line 3: invalid/unknown driver 'nl80211'
    1 errors found in configuration file '/tmp/fakeAP_pwn.hostapd'
    So I don't have the nl80211 driver installed. I modprobed to check for it and it's definitely not there. Now a site I came across says I should install the compat-wireless package to get the module. I'm a little timid doing this. Is that the right thing to do?

  2. #22
    Member joker5bb's Avatar
    Join Date
    Feb 2010
    Posts
    166

    Default Re: [Script] [Video] fakeAP_pwn (v0.3)

    Quote Originally Posted by cseven View Post
    I'm somewhat in the same boat as I just installed hostapd and then ran the fakeAP_pwn script. What I did notice is that it says:

    Code:
    [>] Starting: Access point
    'Fake' Access Point~hostapd /tmp/fakeAP_pwn.hostapd
    Configuration file: /tmp/fakeAP_pwn.hostapd
    Line 3: invalid/unknown driver 'nl80211'
    1 errors found in configuration file '/tmp/fakeAP_pwn.hostapd'
    So I don't have the nl80211 driver installed. I modprobed to check for it and it's definitely not there. Now a site I came across says I should install the compat-wireless package to get the module. I'm a little timid doing this. Is that the right thing to do?
    you have to compile hostapd as follows below:

    Code:
    git clone git://w1.fi/srv/git/hostap.git
    cd hostap/hostapd
    
    # Copy the default config to .config for use during this build
    cp defconfig .config
    
    # Edit .config
    vi .config 
    
    #  you need to uncomment these lines, at a minimum
    # 
    #  CONFIG_DRIVER_NL80211=y
    #  LIBNL=/usr
    #  CFLAGS += -I$(LIBNL)/include
    #  LIBS += -L$(LIBNL)/lib
    
    make
    make install

  3. #23
    Just burned his ISO
    Join Date
    Jul 2010
    Posts
    17

    Question Re: [Script] [Video] fakeAP_pwn (v0.3)

    Well I'v been playing with this for a while now, testing on multiple clients with multiple payloads and still have the same problem i did with 2.4 lol

    I was kinda hoping this might be fixed in the update but apparently not:

    Hardware : ALFA card, RTL8187 b/g
    Client : Netgear WG111v3 b/g
    Client OS: Win XP, Win7 Ultimate

    So DNS, DHCP, Apache, the IPtables redirect, even airbase-ng have all been working flawlessly for me for a while now. Everything connects and authenticates correctly.

    I run into a problem when I execute the payload, It never passes 'Sending stage (723456 bytes)' inside metasploit. I really don't know weather its some sort of time-out problem or something in the ruby script..

    Any ideas or similar problems like this? I'm a bit stuck here.
    Great job to everyone with the progression on this script, Thanks in advance.

  4. #24
    Member
    Join Date
    Feb 2009
    Location
    0,0
    Posts
    90

    Default Re: [Script] [Video] fakeAP_pwn (v0.3)

    you my man are a genius, works perfect and is much faster then airbase-ng. Now I can play with the other settings as I have only tested the normal mode of fakeAP_pwn

    Thanks!

  5. #25
    Member
    Join Date
    Feb 2009
    Location
    0,0
    Posts
    90

    Default Re: [Script] [Video] fakeAP_pwn (v0.3)

    Just a FYI when using hostap, when Ctrl-C to end the script it doesn't clean up the interfaces and leaves mon.wlan1 (in my case). A simple fix by stopping the interface with airmon-ng stop but if you weren't aware and went to run fakeAP_pwn again it would give an error [-] The wireless interface wlan1, isn't correct.

  6. #26
    Member joker5bb's Avatar
    Join Date
    Feb 2010
    Posts
    166

    Default Re: [Script] [Video] fakeAP_pwn (v0.3)

    Quote Originally Posted by cseven View Post
    Just a FYI when using hostap, when Ctrl-C to end the script it doesn't clean up the interfaces and leaves mon.wlan1 (in my case). A simple fix by stopping the interface with airmon-ng stop but if you weren't aware and went to run fakeAP_pwn again it would give an error [-] The wireless interface wlan1, isn't correct.
    yes im am aware of this problem, to stop the hostapd properly just press Ctrl+C in the hostapd window then press Ctrl+C where you ran the script

  7. #27
    Just burned his ISO notfaded1's Avatar
    Join Date
    Sep 2010
    Location
    Somewhere USA
    Posts
    8

    Default Re: [Script] [Video] fakeAP_pwn (v0.3)

    Thnx g0tm1lk for a saweet script and props to joker5bb for the hostapd compile tip. All of g0tm1lks links worked fine 4 me yesterday 9/14/10...

  8. #28
    Just burned his ISO
    Join Date
    Jul 2010
    Posts
    17

    Default Re: [Script] [Video] fakeAP_pwn (v0.3)

    Sorry for the double post but I'v been messing around with hostapd and got it all compiled, installed, and I think configured.. (done the way joker suggested)

    But when I try to run the script it executes hostapd with the generated config file and outputs this error then closes after a few seconds: rfkill: Cannot open RFKILL control device

    I don't have much problem with airebase-ng regardless but just wondering if mabey I did something wrong during installation, when I ran make install it output: "for i in hostapd hostapd_cli; do cp -f $i /usr/local/bin/$i; done"

    I can run hostapd service without a problem and seems to be functional until I try the script. Thanks again.

  9. #29
    Good friend of the forums Eatme's Avatar
    Join Date
    Aug 2009
    Location
    Socks5
    Posts
    308

    Default Re: [Script] [Video] fakeAP_pwn (v0.3)

    Quote Originally Posted by Eatme View Post
    no i have it on Transparent

    ok it connects now...but

    when I run the update file on the victim(s) machine, nothing happens...

    Attacker machine just sits at:

    [i] Waiting for the target to run the "update" file

    everything is set to:
    mode:transparent
    payload="vnc"

    victim1 OS=Windows XP SP3 32-Bit
    victim2 OS=Windows 7 64-Bit

    same thing happens on both scenarios...

    help, thanks.
    is there any reason why this is happening..
    Wiffy-Auto-Cracker - was the best thing that ever happen to me. :) Wo0oT :)
    AWUSO36H_500mW_5dBi Antenna

  10. #30
    Moderator g0tmi1k's Avatar
    Join Date
    Feb 2010
    Posts
    1,771

    Default Re: [Script] [Video] fakeAP_pwn (v0.3)

    Quote Originally Posted by parrotface View Post
    Not got my head round hostapd yet, I need to spent more time looking.
    All Ive done was apt-get to install. I have found the hostapd.conf but not made any changes yet.
    /etc/init.d/hostapd start seems to work. If I try and use hostapd in the script it says "hostapd failed to start"
    Also tried install via the script with same results.

    I have changed the attacker machine to HP laptop with Broadcom WiFi and the FreeWiFi does not show up as an AP on the target machine(another HP laptop). But using a USB adapter (zd1211) in the attack machine (wlan1) things work better. The target can connect to FreeWiFi, down load and get a meterpreter session, and also shell works, but NO access to the internet.
    Target gets IP 10.0.0.150 and can ping 10.0.0.1
    I can also ping the router 192.168.1.250
    Is this a DNS problem? But I can’t ping googles IP.
    Many thanks
    With hostapd, you can't do apt-get install hostapd )=
    Read Jokers reply about how to use GIT (Hopefully soon you'll be able to use the script)
    Yeah, airbase-ng gives mix results.

    When you try and ping, what IP does google get? (if any?)
    Can the attacker surf okay?
    Could you post the output from -d?



    Quote Originally Posted by Eatme View Post
    no i have it on Transparent
    ok it connects now...but
    when I run the update file on the victim(s) machine, nothing happens...
    Attacker machine just sits at:
    [i] Waiting for the target to run the "update" file
    everything is set to:
    mode:transparent
    payload="vnc"

    victim1 OS=Windows XP SP3 32-Bit
    victim2 OS=Windows 7 64-Bit

    same thing happens on both scenarios...
    help, thanks.
    What IP does the targets get?
    Can you ping the fake AP? (10.0.0.1?)
    Can you ping google?
    Could you post the output from -d?



    Quote Originally Posted by cseven View Post
    I'm somewhat in the same boat as I just installed hostapd and then ran the fakeAP_pwn script. What I did notice is that it says:
    Code:
    [>] Starting: Access point
    'Fake' Access Point~hostapd /tmp/fakeAP_pwn.hostapd
    Configuration file: /tmp/fakeAP_pwn.hostapd
    Line 3: invalid/unknown driver 'nl80211'
    1 errors found in configuration file '/tmp/fakeAP_pwn.hostapd'
    So I don't have the nl80211 driver installed. I modprobed to check for it and it's definitely not there. Now a site I came across says I should install the compat-wireless package to get the module. I'm a little timid doing this. Is that the right thing to do?
    Looks like joker found a fix for you *and hes fix the script too!*
    I haven't yet got hostapd working (just got my laptop back), Joker understand hostapd alot better than I do.



    Quote Originally Posted by kernel831 View Post
    Well I'v been playing with this for a while now, testing on multiple clients with multiple payloads and still have the same problem i did with 2.4 lol

    I was kinda hoping this might be fixed in the update but apparently not:

    Hardware : ALFA card, RTL8187 b/g
    Client : Netgear WG111v3 b/g
    Client OS: Win XP, Win7 Ultimate

    So DNS, DHCP, Apache, the IPtables redirect, even airbase-ng have all been working flawlessly for me for a while now. Everything connects and authenticates correctly.

    I run into a problem when I execute the payload, It never passes 'Sending stage (723456 bytes)' inside metasploit. I really don't know weather its some sort of time-out problem or something in the ruby script..

    Any ideas or similar problems like this? I'm a bit stuck here.
    Great job to everyone with the progression on this script, Thanks in advance.
    Are you using airbase-ng?
    What speed does the target download the payload?
    Firewalls?
    How long do you wait for?



    Quote Originally Posted by cseven View Post
    you my man are a genius, works perfect and is much faster then airbase-ng. Now I can play with the other settings as I have only tested the normal mode of fakeAP_pwn

    Thanks!
    After catching up on the replys, its great to hear someone has it working! (=
    Thanks joker



    Quote Originally Posted by cseven View Post
    Just a FYI when using hostap, when Ctrl-C to end the script it doesn't clean up the interfaces and leaves mon.wlan1 (in my case). A simple fix by stopping the interface with airmon-ng stop but if you weren't aware and went to run fakeAP_pwn again it would give an error [-] The wireless interface wlan1, isn't correct.
    Its been added into the update. (=



    Quote Originally Posted by notfaded1 View Post
    Thnx g0tm1lk for a saweet script and props to joker5bb for the hostapd compile tip. All of g0tm1lks links worked fine 4 me yesterday 9/14/10...
    *YEY* Another one!
    Thanks for the feedback. (=



    Quote Originally Posted by kernel831 View Post
    Sorry for the double post but I'v been messing around with hostapd and got it all compiled, installed, and I think configured.. (done the way joker suggested)

    But when I try to run the script it executes hostapd with the generated config file and outputs this error then closes after a few seconds: rfkill: Cannot open RFKILL control device

    I don't have much problem with airebase-ng regardless but just wondering if mabey I did something wrong during installation, when I ran make install it output: "for i in hostapd hostapd_cli; do cp -f $i /usr/local/bin/$i; done"

    I can run hostapd service without a problem and seems to be functional until I try the script. Thanks again.
    Sounds like a driver issue?
    airbase-ng isnt as picky - but its not as stable/reliable (for that reason!)
    Doing a quick google, this pop up:
    Rfkill Query Tool - Linux Forums



    Quote Originally Posted by Eatme View Post
    is there any reason why this is happening..
    Please don't bump your posts.
    Last edited by g0tmi1k; 09-16-2010 at 10:14 AM.
    Have you...g0tmi1k?

Page 3 of 15 FirstFirst 1234513 ... LastLast

Similar Threads

  1. [Script][Video] EvilGrade (v0.1.1)
    By g0tmi1k in forum BackTrack Videos
    Replies: 27
    Last Post: 03-06-2011, 12:24 PM
  2. [Script] [Video] metasploit-FakeUpdate (v0.1.1)
    By g0tmi1k in forum BackTrack Videos
    Replies: 30
    Last Post: 12-06-2010, 04:53 PM
  3. [Script][Video] - Using McGrew Security's nbnspoof.py
    By orgcandman in forum Beginners Forum
    Replies: 3
    Last Post: 11-17-2010, 07:36 PM
  4. [Script] [Video] FakeAP_pwn (v0.2.1)
    By g0tmi1k in forum BackTrack Videos
    Replies: 184
    Last Post: 09-02-2010, 11:01 AM
  5. Replies: 10
    Last Post: 07-12-2010, 03:04 PM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •