Home General News Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing

Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing

852
0


Kali Linux Tutorial  - XeroSploit GBHackers - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing

In this Linux , we are to work with Xerosploit. Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different modules that permit to acknowledge proficient assault and furthermore permits to do attacks and port filtering.

We can use this tool to perform DOS, MITMattacks, also the tool has drifnet modules which capture  and also it will be used in performing Injection attacks. It was Committed by LionSec1, it is a powerful and simple to use the tool.

Also Read Offline Password Cracking with John the Ripper – Tutorial

Tool Dependencies

  • nmap
  • hping3
  • build-essential
  • ruby-dev
  • libpcap-dev
  • libgmp3-dev
  • tabulate
  • terminaltables

Tool Features

  • Port scanning
  • Network mapping
  • Dos attack
  • Html code injection
  • Javascript code injection
  • Download interception and replacement
  • DNS
  • Background audio reproduction
  • Images replacement
  • Drifnet
  • Webpage defacement and more.

Kali Linux Tutorial – Xerosploit

To clone Xerosploit git clone https://github.com/LionSec/xerosploit and to run installation sudo python install.py

- Xerosploit 1 - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing

- Xerosploit 2 - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images SniffingNeed to select your operating system and to launch type Xerosploit.

- Xerosploit 3 - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing

Just need to type help to view all the commands.

- Xerosploit 4 - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing

First, we need to scan the network to map all the devices. Xero  scan

- Xerosploit 5 - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing

Then select the target IP address and type help.

- Xerosploit 6 - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing

You can select any Module to attack, let’s we start with port scanner pscan.

- Xerosploit 7 - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing

Next, we go on try a Dos attack, for examining packets we have configured Wireshark in the recipient system.

Type back to go the main menu and then dos >> run to perform the attack.

- Xerosploit 8 - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing- Xerosploit 9 - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing

Now let’s try sniffing the images what your friend seeing in his computer.

- Xerosploit 10 - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing- Xerosploit 11 - Kali Linux Tutorial – Toolkit for mitm, Spoofing, DOS, Images Sniffing

Once the attack launched we can sniff down all the images that he is viewing on his computer in our screen.

We can do much more with this tool simply by using the move you can shake the browser contents and with Yplay you can make audios to play in the background.

Disclaimer

This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and www.gbhackers.com  will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.





Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here