InfamousSYN / rogue

An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
https://the-rogue-toolkit.readthedocs.io/en/latest/
GNU General Public License v3.0
286 stars 52 forks source link

Modlishka Fails to start with certification generation error. #40

Closed anoduck closed 1 year ago

anoduck commented 1 year ago

Error encountered with generation of Modlishka certificate on a fresh and updated installation of Kali linux.

wlan0: ACS-STARTED 
[Sun Sep 17 00:07:10 2023]  INF  Enabling plugin: autocert v0.1
[Sun Sep 17 00:07:10 2023]  INF  Autocert plugin: Auto-generating my-host.com domain TLS certificate
[Sun Sep 17 00:07:11 2023]  ERR  Error creating certificate: x509: serial number must be positive
[Sun Sep 17 00:07:11 2023]  INF  Enabling plugin: control_panel v0.1
[Sun Sep 17 00:07:11 2023]  INF  Enabling plugin: hijack v0.1
[Sun Sep 17 00:07:11 2023]  INF  Enabling plugin: template v0.1
[Sun Sep 17 00:07:11 2023]  INF  Control Panel: modlishka.example.com handler registered
[Sun Sep 17 00:07:11 2023]  INF  Control Panel URL: my-host.com/modlishka.example.com
[Sun Sep 17 00:07:11 2023]  INF  

 _______           __ __ __         __     __          
|   |   |.-----.--|  |  |__|.-----.|  |--.|  |--.---.-.
|       ||  _  |  _  |  |  ||__ --||     ||    <|  _  |
|__|_|__||_____|_____|__|__||_____||__|__||__|__|___._|

>>>> "Modlishka" Reverse Proxy started - v.1.1 <<<<
Author: Piotr Duszynski @drk1wi  

Listening on [192.168.xxx.xxx:443]
Proxying HTTPS [somesite.com] via [https://my-host.com]
Listening on [192.168.xxx.xxx:80]
Proxying HTTP [somesite.com] via [http://my-host.com]
[Sun Sep 17 00:07:11 2023]  !!!  x509: malformed certificate . Terminating.
anoduck commented 1 year ago

As my Computer Science professor said, "Documentation, documentation, documentation!!!". Still beats the hell out of wifipumpkin3.