![]() Then, I thought it might be an issue with my router, so I tried to run a hotspot on my iPhone. I thought it might have been caused by having IP forwarding disabled, but as it turns out it works even worse when it's enabled (connection is lost on victim's machine almost immediately). I have to stop the attack and reconnect the victim machine to the router to make it's internet connection work again. After a minute or so my connection on the victim machine is completely dead. ![]() I can sniff username/passwords when it connects to http sites. ![]() To start the attack I use: python mitmf.py -i wlan0 -target X.X.X.2 -gateway X.X.X.1 -arp -spoof -hsts I'm running Kali Linux with MITMf(9.8) and SSLstrip. Recently I became interested in sniffing/spoofing.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |