-
kubernetes clusters using shared linux bridge networking(docker, flannel, kubenet?) for connecting the containers with in the same host are prone to cross-container man-in-the-middle attacks through a…
-
Hello again,
This has been working perfectly for over a month now, but last Monday (7th) it suddenly stopped logging data :-(
I'm not sure why, nothing has changed with the config at all. Restartin…
-
I'm having some constraints:
1. if run / replaceimg then the target can not connect to the internet.
2. If the target using antivirus it will be detected as ARP Poisoning at run / mitm.
3. Network …
-
I just realized that, in truth the script is not working here. I'm making some tests trying to kick off some of my devices (iPhone 6s Plus, iPad Pro 9.7) and the connection still working as usual.
…
-
How come I get the following error, when running the command as **sudo**
```
$ sudo tcpdump -qnntttt dst port 80 or 443
tcpdump: eth0: You don't have permission to capture on that device
(sock…
-
MACBOOK AIR OSX YOSEMITE - en0
kickthemout is very slow and it doesn't work,
I dont un
kickthemout> 3
kickALLOff selected...
Target(s):
[0] xxxxxxxxxxxx xxxxxxxxxxxxxxxxApple, Inc. (…
-
/replaceimg ip doesn't work
> 📷 Please send the image you want to replace others with:
> *.jpg
>
> lanGhost, [01.03.18 15:04]
> Starting attack with ID: 1
>
> lanGhost, [01.03.18 15:04]
> …
-
I needed to redirect traffic from one host to another (without any proxying) during arp spoofing attacks. As far as I know, it's not possible to do that using the tcp_proxy.go and I wrote a quick hack…
bmaia updated
6 years ago
-
Hello guys, I opened that issue so you will be able to share some ideas concerning cSploit.
Here is mine (working on it if @tux-mind thinks it clan be good):
- bluetooth hacking
- geo traceroute
- soc…
-
*Description of the bug or feature request*
I'm trying to perform some dynamic analysis on a live malware running on a physical Android device. I need to sniff HTTP & HTTPS traffic coming from the …