![]() |
Hello, sorry to bother you all, but I have a problem that I have been working from out of a book that I am following. So the issue is this...I'm trying to achieve this (see highlighted green output in pictures) in a lab environment i have setup. Currently I have 3 VMs running - 1 with pfsense acting as a firewall and router to the WAN. 1 x metasploitable v2 acting as the target. 1 x Kali linux setup which I'll be running the terminal commands on. The problem I have is I cannot get the http request s from the target on the kali terminal using urlsnarf command. I have followed all the instructions in the book to perform this mitm attack and arpspoof works correctly as mentioned in the book, plus I am able to ping from all vms to each other. But I'm not getting an output, just says listening in on port 80 forever. I did wait a few minutes for the packets to parse through the network but no joy. Any ideas at all? I have a screen video as seen above, where you can see in action (watch on a desktop as mobile it will be too small to see) what I am trying to achieve. Any help will be much appreciated! [link] [comments] |
from hacking: security in practice https://ift.tt/QaA0XJ8
Comments
Post a Comment