quarta-feira, 26 de agosto de 2020

DSploit

DSploit

After playing with the applications installed on the Pwn Pad, I found that the most important application (at least for me) was missing from the pre-installed apps. Namely, DSploit. Although DSploit has tons of features, I really liked the multiprotocol password sniffing (same as dsniff) and the session hijacking functionality.

The DSploit APK in the Play Store was not working for me, but the latest nightly on http://dsploit.net worked like a charm.

Most features require that you and your target uses the same WiFi network, and that's it. It can be Open, WEP, WPA/WPA2 Personal. On all of these networks, DSploit will sniff the passwords - because of the active attacks. E.g. a lot of email clients still use IMAP with clear text passwords, or some webmails, etc. 

First, DSploit lists the AP and the known devices on the network. In this case, I chose one victim client.


In the following submenu, there are tons of options, but the best features are in the MITM section. 


Stealthiness warning: in some cases, I received the following popup on the victim Windows:


This is what we have under the MITM submenu:


Password sniffing

For example, let's start with the Password Sniffer. It is the same as EvilAP and DSniff in my previous post. With the same results for the popular Hungarian webmail with the default secure login checkbox turned off. Don't forget, this is not an Open WiFi network, but one with WPA2 protection!


Session hijack

Now let's assume that the victim is very security-aware and he checks the secure login checkbox. Another cause can be that the victim already logged in, long before we started to attack. The session hijacking function is similar to the Firesheep tool, but it works with every website where the session cookies are sent in clear text, and there is no need for any additional support.

In a session hijacking attack (also called "sidejacking"), after the victim browser sends the authentication cookies in clear text, DSploit copies these cookies into its own browser, and opens the website with the same cookies, which results in successful login most of the time. Let's see session hijacking in action!

Here, we can see that the session cookies have been sniffed from the air:


Let's select that session, and be amazed that we logged into the user's webmail session.




Redirect traffic

This feature can be used both for fun or profit. For fun, you can redirect all the victim traffic to http://www.kittenwar.com/. For-profit, you can redirect your victim to phishing pages.


Replace images, videos

I think this is just for fun here. Endless Rick Rolling possibilities.


Script injection

This is mostly for profit. client-side injection, drive-by-exploits, endless possibilities.

Custom filter

If you are familiar with ettercap, this has similar functionalities (but dumber), with string or regex replacements. E.g. you can replace the news, stock prices, which pizza the victim ordered, etc. If you know more fun stuff here, please leave a comment (only HTTP scenario - e.g. attacking Facebook won't work).

Additional fun (not in DSploit) - SSLStrip 

From the MITM section of DSploit, I really miss the SSLStrip functionality. Luckily, it is built into the Pwn Pad. With the help of SSLStrip, we can remove the references to HTTPS links in the clear text HTTP traffic, and replace those with HTTP. So even if the user checks the secure login checkbox at freemail.hu, the password will be sent in clear text - thus it can be sniffed with DSniff.

HTML source on the client-side without SSLstrip:


HTML source on the client-side with SSL strip:


With EvilAP, SSLStrip, and DSniff, the password can be stolen. No hacking skillz needed.

Lessons learned here

If you are a website operator where you allow your users to login, always:
  1. Use HTTPS with a trusted certificate, and redirect all unencrypted traffic to HTTPS ASAP
  2. Mark the session cookies with the secure flag
  3. Use HSTS to prevent SSLStrip attacks
If you are a user:
  1. Don't trust sites with your confidential data if the above points are not fixed. Choose a more secure alternative
  2. Use HTTPS everywhere plugin
  3. For improved security, use VPN
Because hacking has never been so easy before.
And last but not least, if you like the DSploit project, don't forget to donate them!

More information


  1. Hacker Tools List
  2. Hacking Tools Hardware
  3. Hacking Tools Free Download
  4. Hacking Tools For Kali Linux
  5. Pentest Tools Nmap
  6. Hacking Tools Software
  7. Hacker Tools For Ios
  8. Pentest Tools For Mac
  9. Pentest Tools Framework
  10. Pentest Tools For Ubuntu
  11. Pentest Tools For Mac
  12. Hacker Tools List
  13. Pentest Tools List
  14. What Are Hacking Tools
  15. Hacker Tools Linux
  16. Hack Tool Apk No Root
  17. Hacker
  18. Hack And Tools
  19. Hacks And Tools
  20. Hacker Tools Apk
  21. Hacking Tools Hardware
  22. Pentest Tools Free
  23. Hacking Tools Software
  24. Hackrf Tools
  25. Hacker
  26. Hack Tools Download
  27. Hacking Tools For Pc
  28. Hack Tools 2019
  29. Hack Tools
  30. Pentest Tools Tcp Port Scanner
  31. World No 1 Hacker Software
  32. Hacker
  33. Hack Tools Download
  34. Hack Tools Github
  35. Pentest Tools Review
  36. Hacking Tools For Games
  37. How To Hack
  38. Hacker Tool Kit
  39. Hack And Tools
  40. Best Hacking Tools 2019
  41. Best Pentesting Tools 2018
  42. Hacker Tools For Ios
  43. Hacking Tools Software
  44. Hacking Tools Free Download
  45. Hacker Tools Free
  46. Hack Apps
  47. Pentest Tools
  48. Kik Hack Tools
  49. Tools 4 Hack
  50. Hacking Tools Pc
  51. Pentest Tools List
  52. Hack Tools
  53. Pentest Recon Tools
  54. Hack Tools For Pc
  55. What Are Hacking Tools
  56. Computer Hacker
  57. Hacker Tools Mac
  58. Hacking Tools And Software
  59. Github Hacking Tools
  60. Hacker Tools List
  61. Bluetooth Hacking Tools Kali
  62. New Hack Tools
  63. Hacker Tools
  64. Black Hat Hacker Tools
  65. Bluetooth Hacking Tools Kali
  66. Pentest Tools For Windows
  67. Top Pentest Tools
  68. Hack Rom Tools
  69. Pentest Tools List
  70. Hacker Tools Software
  71. Pentest Tools For Mac
  72. Best Pentesting Tools 2018
  73. Black Hat Hacker Tools
  74. Hack App
  75. Hacker Hardware Tools
  76. Hack Tools
  77. Pentest Tools List
  78. Hacker Tools 2020
  79. Hacking Tools For Pc
  80. Tools 4 Hack
  81. Hacker Security Tools
  82. Nsa Hack Tools
  83. Hacker Tools Linux
  84. Hacking Tools Github
  85. Pentest Recon Tools
  86. Pentest Tools Website
  87. Hacker Tools For Mac
  88. What Is Hacking Tools
  89. Hacks And Tools
  90. Android Hack Tools Github
  91. Hack App
  92. Hacker Tools Windows
  93. Pentest Tools Linux
  94. Hacking Tools Github
  95. Growth Hacker Tools
  96. Hack And Tools
  97. New Hack Tools
  98. Hacking Tools Pc
  99. Pentest Tools Bluekeep
  100. Hacker Security Tools
  101. Hack Tools For Ubuntu
  102. Easy Hack Tools
  103. What Is Hacking Tools
  104. Hak5 Tools
  105. Ethical Hacker Tools
  106. Hacker Tools Online
  107. Pentest Tools For Android
  108. Beginner Hacker Tools
  109. Hacking Tools For Windows 7
  110. Hacking Tools For Kali Linux
  111. What Is Hacking Tools
  112. Wifi Hacker Tools For Windows
  113. Pentest Tools Website Vulnerability
  114. Hacker
  115. Hacker Tools Github
  116. Hack Tools For Games
  117. Pentest Tools Port Scanner
  118. Pentest Tools Find Subdomains
  119. Hack Tools Online
  120. Hack Tools For Pc
  121. Hacking Tools And Software
  122. Tools For Hacker
  123. Hack Tools Online
  124. Hackers Toolbox
  125. Pentest Tools Review
  126. Hacker Tools Software
  127. Hacking Tools Hardware
  128. Hacker Tools Apk Download
  129. Pentest Recon Tools
  130. How To Install Pentest Tools In Ubuntu
  131. Pentest Tools For Windows
  132. Hacking Tools 2019
  133. Hacking Tools And Software
  134. Hacking Tools Download
  135. Hacking Tools Usb
  136. Hacker Tools Apk Download
  137. Hacking Tools Name
  138. Blackhat Hacker Tools
  139. Hack Tools For Mac
  140. Pentest Tools Windows
  141. Hacker Tools For Windows
  142. Hack App
  143. Hack Website Online Tool

Nenhum comentário:

Postar um comentário