Warning: Attempt to read property "comment_count" on null in /home/host1362995/kali.org.ru/htdocs/www/wp-includes/general-template.php on line 3194
Warning: Attempt to read property "ID" on null in /home/host1362995/kali.org.ru/htdocs/www/wp-includes/post-template.php on line 674

Warning: Attempt to read property "post_type" on null in /home/host1362995/kali.org.ru/htdocs/www/wp-includes/post-template.php on line 675

Warning: Attempt to read property "post_parent" on null in /home/host1362995/kali.org.ru/htdocs/www/wp-includes/post-template.php on line 728
class="-template-default page page-id- page-parent wp-embed-responsive global-layout-right-sidebar wpf-default wpft-post wpf-guest wpfu-group-4 wpf-theme-2022 wpf-is_standalone-1 wpf-boardid-0 is_wpforo_page-1 is_wpforo_url-1 is_wpforo_shortcode_page-0 wpforo">
Уведомления
Очистить все

how can i perform dns rebinding using evil twin in local level ?!

1 Записи
1 Пользователи
0 Likes
3,376 Просмотры
(@moooooon)
New Member
Присоединился: 5 лет назад
Записи: 1
Создатель темы  

how can i perform dns rebinding using evil twin in local level ?

as the title says i want to perform this attack https://sinister.ly/Thread-DNS-Rebinding-Attack

using evil twin on local level

the curl command to login into the router

curl "http://192.168.1.1/" --data "frashnum=&action=login&Frm_Logintoken=25&Username=admin&Password=admin"

the curl command to get the page that contains the wifi password

curl -v -X GET "http://192.168.1.1/getpage.gch?pid=1002^&nextpage=net_t.gch" -o 565.html

this how i was planing to perform the attack
evil twining a wifi using fluxion or whatever .... when the user opens the captive portal sign in network page (that has dns rebinding scripts in it )is detected we stop the ddos ... the user auto connects to his wifi then the page refreshes and execute the dns rebinding attack to get the wifi password from his router ....

but now i don't know how will get the html file back if want to use it in local level only

what do you think folks ?

i don't know ajax so i can't write the code for the exploiting page 

   
Цитата
Поделиться: