m4n3dw0lf / pythem

pentest framework
GNU General Public License v3.0
1.2k stars 322 forks source link

help me #12

Closed nguyentrungduc1 closed 7 years ago

nguyentrungduc1 commented 7 years ago

" my English . very bad " hsts by pass on kali linux rolling don't action . target. not load thanks a lot

nguyentrungduc1 commented 7 years ago

hinh ch p t 2016-10-27 14-50-29 That is all. after : pythem> set interface wlan0 pythem> set gateway 192.168.1.1 pythem> set target 192.168.1.9 pythem> arpspoof start [+] Setting the packet forwarding. [+] Iptables redefined. [+] ARP spoofing initialized. pythem> hstsbypass [_] SSLstrip+ initialized |by: LeonardoNve && M.Marlinspike [] DNS2Proxy initialized |_by: LeonardoNve pythem> sniff core

nguyentrungduc1 commented 7 years ago

please !

m4n3dw0lf commented 7 years ago

First - Can't sniff HTTP traffic? Second - Why the target is making the DNS queries to 203.162.27.200 instead of the gateway 192.168.1.1? Third - The firewall has rules to block ICMP?

nguyentrungduc1 commented 7 years ago

I don't know the dns2proxy configuration

m4n3dw0lf commented 7 years ago

https://github.com/m4n3dw0lf/PytheM/tree/master/third-party/dns2proxy

nguyentrungduc1 commented 7 years ago

translated from English to Vietnamese inscrutable. But thank you very much