Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Usage of SETH using public IP's as host IP #50

Closed
gurkankkk opened this issue Apr 9, 2020 · 5 comments
Closed

Usage of SETH using public IP's as host IP #50

gurkankkk opened this issue Apr 9, 2020 · 5 comments

Comments

@gurkankkk
Copy link

When I try to intercept RDP locally with my KALI LINUX VM having IP 192.168.11.40 & my victim (local PC) 192.168.11.64 I fail to get any SYN packet if I use the public IP of my RDP test server.

My command looks like ./seth.sh eth0 192.168.11.40 192.168.11.40 150.5.5.5
the public ip is not real in this case of course.

The script stays idle at the step [*] Waiting for a SYN packet to the original destination...

If i force RDP connection on my local PC (victim), i see nothing 'moving' in the script window.

Is this because public IP's are not supported as host IP's in the script?

@AdrianVollmer
Copy link
Member

AdrianVollmer commented Apr 9, 2020 via email

@gurkankkk
Copy link
Author

gurkankkk commented Apr 9, 2020

Yes, this can't work. Instead of the public IP, you should use the gateway (you can find it with ip r|grep default). Note that you use the same IP for victim and attacker (I assume accidentally). Seth does ARP spoofing, and ARP spoofing only works in the same subnet. That's why you need to specify the gateway, so you become MitM between the victim and the gateway from which traffic is routed to the internet.

Thank you very much. All is up and running. I just have a question: why does this not work with rdp connections secured by a public certificate? i still don't understand the difference between them and the funcitonality of this tool.

I have 2 environments: a environment with a public cert and an environment with a self-signed cert. The tool works with the self signed cert by why not with the public cert? why can't it spoof the public one

@AdrianVollmer
Copy link
Member

AdrianVollmer commented Apr 9, 2020 via email

@gurkankkk
Copy link
Author

But I still don't understand why we have the following error for a public certificate protected rdp:

The connection has been terminated because an unexpected server authentication certificate was received from the remote computer.
Try connecting again. If the problem continues, contact the owner of the remote computer or your network administrator.

we don't have this for non public cert protected rdp environments and we're scratching our heads to know why

@gurkankkk
Copy link
Author

nevermind, i managed to intercept using SETH_DOWNGRADE=1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants