sensepost / mana

*DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM
https://w1f1.net/
Other
1.09k stars 275 forks source link

Fixing Client not to connecting to the fake AP #72

Closed jesusmmago closed 6 years ago

jesusmmago commented 7 years ago

Title: start-noupstream.sh - Client not to connecting to the fake AP URL: https://github.com/sensepost/mana/issues/66

I sorted it out using other DNS server. Basically what I did was the next. Add to the /etc/mana-toolkit/karmetasploit.rc file the next lines:

use auxiliary/server/fakedns set TARGETACTION FAKE set TARGETHOST 10.0.0.1 set TARGETDOMAIN * exploit -j exploit -j Comment the next lines in the start-noupstream.sh script: dnsspoof -i $phy -f /etc/mana-toolkit/dnsspoof.conf& dnsmasq -C /etc/mana-toolkit/dnsmasq-dhcpd.conf $phy

And add the next one: dnsmasq -C /etc/mana-toolkit/dnsmasq-dhcpd.conf -i $phy

singe commented 6 years ago

You spotted an error, thanks. dnsmasq needs -i which is why DHCP wasn't working and your client couldn't connect. No need to replace dnsspoof though. I did this https://github.com/sensepost/mana/commit/94cde47ca679224ad5fed34a41468bcbcc105cd0 instead.