Created
January 8, 2024 21:33
-
-
Save aktentasche/989ae400486bbe28c1ac391dedfc6105 to your computer and use it in GitHub Desktop.
pppoe server spoofing telenor
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
manjaro live boot | |
connect to internet | |
sudo pacman -Sy --needed rp-pppoe wireshark-qt | |
sudo gpasswd -a $USER wireshark | |
# find ethernet interface e.g. eno1 or eth0 | |
ip a | |
sudo ip link add link eno1 name eno1.101 type vlan id 101 | |
sudo ip link set dev eno1.101 up | |
cat > pppoe-server-options <<EOF | |
require-pap | |
login | |
lcp-echo-interval 10 | |
lcp-echo-failure 20 | |
ms-dns 8.8.8.8 | |
EOF | |
sudo pppoe-server -I eno1.101 -L 192.168.253.1 -R 192.168.253.2 -O pppoe-server-options | |
sg wireshark -c 'tshark -i eno1.101 -f pppoes -T fields -e pap.peer_id -e pap.password' |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment