Results 1 to 50 of 112

Thread: PwnSTAR running on Kali

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Join Date
    2013-Mar
    Location
    Totally lost
    Posts
    45
    The README has some ideas on how to use it.
    Code:
    
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                       Basic Menu
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
        
        1) Honeypot: get the victim onto your AP, then use nmap, metasploit etc
                     no internet access given
        
        2) Grab WPA handshake
        
        3) Sniffing: provide internet access, then be MITM
        
        4) Simple web server with dnsspoof: redirect the victim to your webpage
           
        5) Karmetasploit
        
        6) Browser_autopwn
    1) Relies on auto-connections ie the device connnects without the owner being aware. You can then attempt to exploit it.
    Target the fake-AP ESSID to something the device has likely connected to previously eg Starbucks WiFi

    2) Sometimes it is easier to steal the handshake than sniff it passively. Set up the AP with the same name and channel as the target, and then DOS the target.
    Airbase will save a pcap containing the handshake to /root/PwnSTAR-n.cap.

    3) Provides an open network, so you can sniff the victim's activities.

    4) Uses apache to serve a webpage. There is an option to load your own page eg one you have cloned. The provided page (hotspot_3) asks for email details.
    Note the client is forced to the page by DNS spoofing. They can only proceed to the internet if you manually stop dnsspoof.
    DNS-caching in the client is a problem with this technique. The captive portal in the advanced menu is a better way of hosting hotspot_3

    5&6) Provides all the arduous config files to properly set-up these attacks.


    Browser_autopwn gaining shells against Windows Vista:




    Code:
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                                       Advanced Menu
    ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
    
        a) Captive portals (phish/sniff)
        
        b) Captive portal + PDF exploit (targets Adobe Reader < v9.3)
    
        c) MSXML 0day (CVE-2012-1889: MSXML Uninitialized Memory Corruption)
        
        d) Java_jre17_jmxbean
        
        e) Choose another browser exploit

    a) Uses iptables rules to route the clients. Is essentially a fully functioning captive portal.
    Avoids the problems of spoofing.

    1) Serves hotspot3. Allows clients onto the internet once credentials are given.

    2) Allows you to add a personal header to the index.php.
    You could probably copy the php functions from this page onto a cloned page and load that instead.

    b) A captive portal which blocks the client until they have downloaded a pdf. This contains a malicious java applet.
    Includes a virgin pdf to which you can add your own payload.

    c&d) Launches a couple of example browser exploits

    e) Gives a skeleton framework for loading any browser exploit of your choice.
    Edit PwnSTAR browser_exploit_fn directly for more control.


    Two clients being simultaneously handled by the captive portal:



    Have fun, and READ THE SCRIPT!
    Vulpi
    Last edited by Vulpi; 2014-04-19 at 07:06.

Similar Threads

  1. PwnSTAR not recognising wlan
    By Matriculate in forum General Archive
    Replies: 0
    Last Post: 2016-04-20, 02:09
  2. Does Pwnstar work on Kali Linux 2.0?
    By jacke4123 in forum General Archive
    Replies: 1
    Last Post: 2015-10-27, 05:24
  3. PwnSTAR and Automatically open page on Fake-AP
    By markrenton in forum Project Archive
    Replies: 0
    Last Post: 2015-09-17, 10:52
  4. easy-creds vs pwnstar
    By boost in forum General Archive
    Replies: 6
    Last Post: 2014-04-21, 17:57
  5. Replies: 31
    Last Post: 2013-12-04, 13:57

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •