ARP poison attack failed. Perhaps I chose my target wrong, or perhaps the random GitHub PoC code has some kind of flaw. My device sent the poisoned ARP packets, I made a request to the same IP, but I'm not reading anything on the listener. I'm not ready to give up yet though. That version of nginx has more than one vulnerability, and I haven't even dove deep yet. So far all I'm doing is running someone else's script.
>what's the PoC script
It's right here
https://github.com/M507/CVE-2021-23017-PoC/blob/main/README.md
scammer site: https://truevalue-reward.com/
I'm running it against the following target (translated IP of above):
38.127.8.124
And I'm using the same IP for my dns server, because nslookup fetches it. Perhaps something is wrong in my target setup?
sudo python3 poc.py --target 38.127.8.124 --dns_server 38.127.8.124
[*] Sending poisoned ARP packets
[*] Listening
...
>>107159491
I have already bought a much better phone. This is just a case of data extraction.