Closed nguyentrungduc1 closed 7 years ago
That is all. after : pythem> set interface wlan0 pythem> set gateway 192.168.1.1 pythem> set target 192.168.1.9 pythem> arpspoof start [+] Setting the packet forwarding. [+] Iptables redefined. [+] ARP spoofing initialized. pythem> hstsbypass [_] SSLstrip+ initialized |by: LeonardoNve && M.Marlinspike [] DNS2Proxy initialized |_by: LeonardoNve pythem> sniff core
please !
First - Can't sniff HTTP traffic? Second - Why the target is making the DNS queries to 203.162.27.200 instead of the gateway 192.168.1.1? Third - The firewall has rules to block ICMP?
I don't know the dns2proxy configuration
translated from English to Vietnamese inscrutable. But thank you very much
" my English . very bad " hsts by pass on kali linux rolling don't action . target. not load thanks a lot