Last active
July 12, 2025 16:53
-
-
Save l4rm4nd/875d4cbacf5a18aa549c87ce9b16cd98 to your computer and use it in GitHub Desktop.
SilentBridge on Raspberry Pi 4 (kali-linux-2025.2-raspberry-pi-arm64.img)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # install dependencies for netifaces | |
| sudo apt install python2-dev -y | |
| # get python2 pip | |
| wget https://bootstrap.pypa.io/pip/2.7/get-pip.py | |
| sudo python2.7 get-pip.py | |
| rm get-pip.py | |
| # downgrade virtualenv to support python2.7 venvs | |
| # see https://github.com/pypa/virtualenv/releases/tag/20.22.0 - drops python2.7 support | |
| pip install virtualenv==20.21.1 --break-system-packages --ignore-installed | |
| # clone silentbridge | |
| git clone https://github.com/s0lst1c3/silentbridge && cd silentbridge | |
| # create venv for python2.7 | |
| virtualenv -p $(which python2) venv2 | |
| source venv2/bin/activate | |
| # install silentbridge dependencies | |
| pip install scapy==2.4.3 --ignore-installed | |
| pip install netifaces | |
| pip install nanpy | |
| # test run silentbridge | |
| python2 ./silentbridge |
Author
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
From https://github.com/scipag/nac_bypass
The actual NAC bypass looks like this:
Warning
As for Responder: Things got a little confusing for me at first.
You can look up the iptables rules like so to see what is going on:
iptables -t nat -LThe nac bypass script will put rules in place, that reroute all traffic intended for the client let´s say port 445 to your bridge. So Responder needs to bet set up to listen on the bridge interface, but change the answering IP address to the one of the victim:
./Responder.py -I br0 -e victim.ip