-
Hello brother I was trying out your code with the cisco 3725 router. It successfully starvet the DHCP server but after the attack it gets released very quickly. What might be the problem? In the arp t…
-
*Description of the bug or feature request*
The description and the title is straight forward.
When I do "ARP.BAN OFF", IT ALSO TURN OFF ARP.SPOOF
idk if this is a bug or they intended to do th…
-
Connection closes after password request, also shows "debug1: Authentication succeeded (password)." despite the fact entered password is incorrect. ssh-mitm is running on Ubuntu 18 as well as the clie…
-
I'm having issues with getting dns spoofing to work. I am connected to my home network wirelessly on both a Raspberry Pi and my laptop, and setting the target as my laptop. I'm spoofing the dns to my …
-
**Is your feature request related to a problem? Please describe.**
I cannot connect to a machine within an advertised subnet. E.g. I can connect to 10.0.0.4 but not 10.0.0.5, this is because WireGu…
-
It would be useful to be able to create firewall rules based on source mac address, similar to netfilter:
`-A FORWARD -m mac --mac-source aa:bb:cc:dd:ee:ff -j ACCEPT`
There seem to have been sev…
-
Hi! Thanks a lot for your research. Its really great. Tried to reproduce your results in lab environment and created a domain.
It consists of two machines:
- DC: Windows Server 2016 Standard 1607 1…
-
We have a GKE cluster in our GCP cloud.
I ran kube-hunter in pod mode i.e using the `--pod` option. It failed to detect the cluster.
Then I used the `--interface` option. Again, it failed to det…
-
ghost updated
3 years ago
-
Running logcat on my device, I find the following the the logs, repeating every ten seconds:
```log
2021-03-24 10:58:12.573 1822-1822/? D/InterruptionStateProvider: No bubble up: not allowed to bu…