What steps will reproduce the problem?
1. ./easy-creds
2. 2-Poisoning Attacks
3. 2-Standard arp poison
4. after asking for everything and it launches the attack but no sslstrip window
What is the expected output? What do you see instead?
What version of the product are you using? On what operating system?
version 3.7.3 Kali Linux amd64
Please provide any additional information below.
also updating sslstrip produce:
cat: /pentest/web/sslstrip/setup.py: No such file or directory
[*] Installed version of SSLStrip:
Latest version of SSLStrip: 0.9
(standard_in) 1: syntax error
/usr/bin/easy-creds: line 294: [: ==: unary operator expected
[+] Looks like you're running the latest version available.
Original issue reported on code.google.com by retrn.to...@gmail.com on 9 Jul 2013 at 5:58
Original issue reported on code.google.com by
retrn.to...@gmail.com
on 9 Jul 2013 at 5:58