DSploit
After playing with the applications installed on the Pwn Pad, I found that the most important application (at least for me) was missing from the pre-installed apps. Namely, DSploit. Although DSploit has tons of features, I really liked the multiprotocol password sniffing (same as dsniff) and the session hijacking functionality.
The DSploit APK in the Play Store was not working for me, but the latest nightly on http://dsploit.net worked like a charm.
Most features require that you and your target uses the same WiFi network, and that's it. It can be Open, WEP, WPA/WPA2 Personal. On all of these networks, DSploit will sniff the passwords - because of the active attacks. E.g. a lot of email clients still use IMAP with clear text passwords, or some webmails, etc.
First, DSploit lists the AP and the known devices on the network. In this case, I chose one victim client.
In the following submenu, there are tons of options, but the best features are in the MITM section.
Stealthiness warning: in some cases, I received the following popup on the victim Windows:
This is what we have under the MITM submenu:
Password sniffing
For example, let's start with the Password Sniffer. It is the same as EvilAP and DSniff in my previous post. With the same results for the popular Hungarian webmail with the default secure login checkbox turned off. Don't forget, this is not an Open WiFi network, but one with WPA2 protection!
Session hijack
Now let's assume that the victim is very security-aware and he checks the secure login checkbox. Another cause can be that the victim already logged in, long before we started to attack. The session hijacking function is similar to the Firesheep tool, but it works with every website where the session cookies are sent in clear text, and there is no need for any additional support.
In a session hijacking attack (also called "sidejacking"), after the victim browser sends the authentication cookies in clear text, DSploit copies these cookies into its own browser, and opens the website with the same cookies, which results in successful login most of the time. Let's see session hijacking in action!
Here, we can see that the session cookies have been sniffed from the air:
Let's select that session, and be amazed that we logged into the user's webmail session.
Redirect traffic
This feature can be used both for fun or profit. For fun, you can redirect all the victim traffic to http://www.kittenwar.com/. For-profit, you can redirect your victim to phishing pages.Replace images, videos
I think this is just for fun here. Endless Rick Rolling possibilities.Script injection
This is mostly for profit. client-side injection, drive-by-exploits, endless possibilities.Custom filter
If you are familiar with ettercap, this has similar functionalities (but dumber), with string or regex replacements. E.g. you can replace the news, stock prices, which pizza the victim ordered, etc. If you know more fun stuff here, please leave a comment (only HTTP scenario - e.g. attacking Facebook won't work).Additional fun (not in DSploit) - SSLStrip
From the MITM section of DSploit, I really miss the SSLStrip functionality. Luckily, it is built into the Pwn Pad. With the help of SSLStrip, we can remove the references to HTTPS links in the clear text HTTP traffic, and replace those with HTTP. So even if the user checks the secure login checkbox at freemail.hu, the password will be sent in clear text - thus it can be sniffed with DSniff.HTML source on the client-side without SSLstrip:
HTML source on the client-side with SSL strip:
With EvilAP, SSLStrip, and DSniff, the password can be stolen. No hacking skillz needed.
Lessons learned here
If you are a website operator where you allow your users to login, always:- Use HTTPS with a trusted certificate, and redirect all unencrypted traffic to HTTPS ASAP
- Mark the session cookies with the secure flag
- Use HSTS to prevent SSLStrip attacks
If you are a user:
- Don't trust sites with your confidential data if the above points are not fixed. Choose a more secure alternative
- Use HTTPS everywhere plugin
- For improved security, use VPN
Because hacking has never been so easy before.
And last but not least, if you like the DSploit project, don't forget to donate them!
And last but not least, if you like the DSploit project, don't forget to donate them!
- Pentest Tools For Mac
- Hacker Tools Linux
- Kik Hack Tools
- Hack Apps
- Hacker Tools Free Download
- Hacking Tools For Windows
- Pentest Tools Nmap
- Hack Tools For Games
- Hack Tool Apk
- Hacking Tools Download
- Hacker Tools Mac
- New Hacker Tools
- Hacking App
- What Is Hacking Tools
- Hacker Tools Hardware
- World No 1 Hacker Software
- Hacker Tools Github
- Hacking Tools Software
- Hacker Techniques Tools And Incident Handling
- Hack Tools For Windows
- Hack Tools Pc
- Hacker
- Pentest Tools Tcp Port Scanner
- Pentest Tools Apk
- Free Pentest Tools For Windows
- How To Make Hacking Tools
- Hack Tools
- How To Install Pentest Tools In Ubuntu
- Hack Tools Mac
- Hacker Tools Apk
- Hacking Tools 2020
- Hack Website Online Tool
- Pentest Tools Alternative
- Pentest Tools Android
- Game Hacking
- Hacker Tools Hardware
- Pentest Automation Tools
- Hacker Tools For Mac
- Hack Tools For Mac
- Tools For Hacker
- Hacker Tools
- Pentest Tools Online
- Hack Tools For Ubuntu
- Hacker Tools Mac
- Hacking Tools For Kali Linux
- Hacker Hardware Tools
- Pentest Tools For Android
- Hacker Tools Apk Download
- Hack Tools Online
- What Is Hacking Tools
- Hacking Tools Software
- Pentest Tools For Windows
- Hacking Tools Online
- Kik Hack Tools
- Hack Rom Tools
- Pentest Tools For Android
- Usb Pentest Tools
- Beginner Hacker Tools
- Hacking Tools Mac
- Wifi Hacker Tools For Windows
- Hack Apps
- Hack Tools For Pc
- Hack Tools For Mac
- Hack Tools Online
- Tools Used For Hacking
- Hacking Tools For Windows
- Android Hack Tools Github
- Ethical Hacker Tools
- Hackers Toolbox
- Android Hack Tools Github
- Pentest Automation Tools
- New Hack Tools
- Tools For Hacker
- Hacks And Tools
- Pentest Tools Website Vulnerability
- Ethical Hacker Tools
- Pentest Tools Kali Linux
- Pentest Tools Subdomain
- Hacking Tools Hardware
- Top Pentest Tools
- Hackrf Tools
- Nsa Hack Tools
- Hacker Techniques Tools And Incident Handling
- Tools Used For Hacking
- Pentest Recon Tools
- Underground Hacker Sites
- Hack Rom Tools
- Pentest Tools Apk
- Hacking Tools For Windows 7
- Hack Apps
- Best Hacking Tools 2020
- Hack Tool Apk
- Hacking Tools For Windows
- Pentest Tools Download
- Wifi Hacker Tools For Windows
- Hack Tool Apk
- Pentest Tools Open Source
- Hack Tools Online
- Pentest Tools Open Source
- Usb Pentest Tools
- Hacking Tools For Mac
- Hackrf Tools
- Pentest Tools Find Subdomains
- Hacker Tools For Pc
- Github Hacking Tools
- Hacker Tools Apk
- Hacking Tools Free Download
- Hacking Apps
- Pentest Tools Online
- Hackers Toolbox
- Usb Pentest Tools
- Usb Pentest Tools
- Termux Hacking Tools 2019
- Pentest Tools Free
- Hacking Tools For Kali Linux
- Android Hack Tools Github
- Hackrf Tools
- Game Hacking
- Pentest Tools Free
- Hacker Tools Linux
- Hacker Tools Hardware
- Pentest Tools Open Source
- Hacker Tools For Ios
- Pentest Tools Download
- Best Hacking Tools 2020
- Hack Tools For Ubuntu
- Pentest Tools For Windows
- Pentest Tools Alternative
- Hacking Tools Online
- Hack Tools Online
- Hacking Tools Windows 10
- Hacking Tools Mac
- Hacker Tools Free Download
- Best Hacking Tools 2020
- Hacking Tools And Software
- What Is Hacking Tools
- Pentest Tools Github
- How To Make Hacking Tools
- Best Pentesting Tools 2018
- Black Hat Hacker Tools
- Hacking Tools For Beginners
- Pentest Reporting Tools
- What Are Hacking Tools
- Tools Used For Hacking
- Hak5 Tools
- Hack Tool Apk
- Hacker Tools For Mac
- Hack Tool Apk No Root
- Hacking Tools Online
- Hacking Tools Hardware
- Hacker Tools Free
- Wifi Hacker Tools For Windows
- Ethical Hacker Tools
- Pentest Tools Linux
- Pentest Tools Framework
- Pentest Tools Linux
- Hacking Tools For Windows Free Download
- Hacking Tools 2020
- Install Pentest Tools Ubuntu
- Blackhat Hacker Tools
- Hacker Tools Mac
- Ethical Hacker Tools
- Pentest Tools Website Vulnerability
- Beginner Hacker Tools
- Pentest Tools
No hay comentarios:
Publicar un comentario