Skip to content
This repository has been archived by the owner on Apr 19, 2020. It is now read-only.

dns spoof attack issue with scan #2

Closed
Zaratros opened this issue Jul 27, 2015 · 5 comments
Closed

dns spoof attack issue with scan #2

Zaratros opened this issue Jul 27, 2015 · 5 comments

Comments

@Zaratros
Copy link

Hello ! I was trying the new version, but I had some problem with dns spoof attack module. I couldn't scan the network properly. Here's what it says:
Exception in thread Thread-1:
Traceback (most recent call last):
File "/usr/lib/python2.7/threading.py", line 552, in __bootstrap_inner
self.run()
File "/usr/lib/python2.7/threading.py", line 505, in run
self.__target(_self.__args, *_self.__kwargs)
File "/usr/share/3vilTwinAttacker/Modules/ModuleDnsSpoof.py", line 441, in scanner_network
for i in on_ips.values():
File "", line 2, in values
File "/usr/lib/python2.7/multiprocessing/managers.py", line 755, in _callmethod
self._connect()
File "/usr/lib/python2.7/multiprocessing/managers.py", line 742, in _connect
conn = self._Client(self._token.address, authkey=self._authkey)
File "/usr/lib/python2.7/multiprocessing/connection.py", line 175, in Client
answer_challenge(c, authkey)
File "/usr/lib/python2.7/multiprocessing/connection.py", line 421, in answer_challenge
message = connection.recv_bytes(256) # reject large message
IOError: [Errno 4] Interrupted system call

We also lost the option to start dns spoofing for the fake windows update module. I can only start server for now

@mh4x0f
Copy link
Member

mh4x0f commented Jul 27, 2015

Hi, this problem with scan i don't found, the line 441 return all ip scanned and after add in table. I can to add (try: function), but this not fix your problem. the scan not return any host scanned. however, I think that your problem is on network, pleace more details about this.

@mh4x0f mh4x0f closed this as completed Jul 27, 2015
@mh4x0f mh4x0f reopened this Jul 27, 2015
@mh4x0f mh4x0f closed this as completed Jul 27, 2015
@mh4x0f mh4x0f reopened this Jul 27, 2015
mh4x0f added a commit that referenced this issue Jul 27, 2015
@mh4x0f
Copy link
Member

mh4x0f commented Jul 27, 2015

hi, I think that fixed the problem with scan IP address.

@Zaratros
Copy link
Author

Hello! The scanner works good (for now), but I got another problem. If I try for example to use windows update attack, then start dns spoofing it doesn't work.

Here's what it says:
QLayout::addChildLayout: layout "" already has a parent
QWidget::setLayout: Attempting to set QLayout "" on frm_Settings "", which already has a layout
QLayout: Attempting to add QLayout "" to frm_template "", which already has a layout
QLayout: Attempting to add QLayout "" to frm_template "", which already has a layout
QLayout: Attempting to add QLayout "" to frm_WinSoftUp "", which already has a layout
QLayout: Attempting to add QLayout "" to frm_WinSoftUp "", which already has a layout
QLayout::addChildLayout: layout "" already has a parent
QWidget::setLayout: Attempting to set QLayout "" on frm_WinSoftUp "", which already has a layout
QLayout::addChildLayout: layout "" already has a parent
QWidget::setLayout: Attempting to set QLayout "" on frm_Settings "", which already has a layout
/bin/echo: write error: Broken pipe
Starting Thread:Server-PHP
Traceback (most recent call last):
File "/usr/share/3vilTwinAttacker/Modules/ModuleDnsSpoof.py", line 355, in Start_Attack
open('echo 1 > /proc/sys/net/ipv4/ip_forward')
IOError: [Errno 2] No such file or directory: 'echo 1 > /proc/sys/net/ipv4/ip_forward'
Traceback (most recent call last):
File "/usr/share/3vilTwinAttacker/Modules/ModuleDnsSpoof.py", line 355, in Start_Attack
open('echo 1 > /proc/sys/net/ipv4/ip_forward')
IOError: [Errno 2] No such file or directory: 'echo 1 > /proc/sys/net/ipv4/ip_forward'

mh4x0f added a commit that referenced this issue Jul 28, 2015
@mh4x0f
Copy link
Member

mh4x0f commented Jul 28, 2015

:D try now

@mh4x0f mh4x0f closed this as completed Jul 28, 2015
@Zaratros
Copy link
Author

Dns spoofing works now, but it's really random. It works once in a while. I'm trying arp spoofing now, it doesn't seem to work for now It worked well in the previous versions
Here's what I get for example when trying arp poisoning attack:

QLayout: Attempting to add QLayout "" to frm_WinSoftUp "", which already has a layout
QLayout: Attempting to add QLayout "" to frm_WinSoftUp "", which already has a layout
QLayout::addChildLayout: layout "" already has a parent
QWidget::setLayout: Attempting to set QLayout "" on frm_WinSoftUp "", which already has a layout
QLayout::addChildLayout: layout "" already has a parent
QWidget::setLayout: Attempting to set QLayout "" on frm_Settings "", which already has a layout
/bin/echo: write error: Broken pipe
Starting Thread:Server-PHP
Traceback (most recent call last):
File "/usr/share/3vilTwinAttacker/Modules/ModuleArpPosion.py", line 292, in Start_Attack
self.conf_attack(True)
File "/usr/share/3vilTwinAttacker/Modules/ModuleArpPosion.py", line 312, in conf_attack
for i in iptables: popen(i)
TypeError: must be string, not QString

mh4x0f added a commit that referenced this issue Jul 28, 2015
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants