Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@bt:/pentest/exploits/framework3# ./msfconsole
- o 8 o o
- 8 8 8
- ooYoYo. .oPYo. o8P .oPYo. .oPYo. .oPYo. 8 .oPYo. o8 o8P
- 8' 8 8 8oooo8 8 .oooo8 Yb.. 8 8 8 8 8 8 8
- 8 8 8 8. 8 8 8 'Yb. 8 8 8 8 8 8 8
- 8 8 8 `Yooo' 8 `YooP8 `YooP' 8YooP' 8 `YooP' 8 8
- ..:..:..:.....:::..::.....::.....:8.....:..:.....::..::..:
- ::::::::::::::::::::::::::::::::::8:::::::::::::::::::::::
- ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
- =[ metasploit v3.8.0-dev [core:3.8 api:1.0]
- + -- --=[ 691 exploits - 358 auxiliary - 39 post
- + -- --=[ 222 payloads - 27 encoders - 8 nops
- =[ svn r12763 updated 4 days ago (2011.05.29)
- msf > use auxiliary/spoof/wifi/airpwn
- msf auxiliary(airpwn) > show options
- Module options (auxiliary/spoof/wifi/airpwn):
- Name Current Setting Required Description
- ---- --------------- -------- -----------
- CHANNEL 11 yes The initial channel
- DRIVER autodetect yes The name of the wireless driver for lorcon
- FILTER port 80 yes Default BPF filter
- INTERFACE wlan0 yes The name of the wireless interface
- MATCH GET ([^ ?]+) HTTP yes Default request match
- RESPONSE Airpwn yes Default response
- SITELIST /opt/framework3/msf3/data/exploits/wifi/airpwn/sitelist.yml no YAML file of URL/Replacement pairs for GET replacement
- USESITEFILE false yes Use site list file for match/response
- msf auxiliary(airpwn) > set channel 13
- channel => 13
- msf auxiliary(airpwn) > set DRIVER Madwifing
- DRIVER => Madwifing
- msf auxiliary(airpwn) > run
- [*] AIRPWN: Parsing responses and defining headers
- [*] AIRPWN: Response packet has no HTTP headers, creating some.
- [*] Opening wifi module.
- ruby: symbol lookup error: /usr/local/lib/site_ruby/1.9.2/i486-linux/Lorcon2.so: undefined symbol: STR2CSTR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement