Friday 28 August 2020

DSploit

DSploit

After playing with the applications installed on the Pwn Pad, I found that the most important application (at least for me) was missing from the pre-installed apps. Namely, DSploit. Although DSploit has tons of features, I really liked the multiprotocol password sniffing (same as dsniff) and the session hijacking functionality.

The DSploit APK in the Play Store was not working for me, but the latest nightly on http://dsploit.net worked like a charm.

Most features require that you and your target uses the same WiFi network, and that's it. It can be Open, WEP, WPA/WPA2 Personal. On all of these networks, DSploit will sniff the passwords - because of the active attacks. E.g. a lot of email clients still use IMAP with clear text passwords, or some webmails, etc. 

First, DSploit lists the AP and the known devices on the network. In this case, I chose one victim client.


In the following submenu, there are tons of options, but the best features are in the MITM section. 


Stealthiness warning: in some cases, I received the following popup on the victim Windows:


This is what we have under the MITM submenu:


Password sniffing

For example, let's start with the Password Sniffer. It is the same as EvilAP and DSniff in my previous post. With the same results for the popular Hungarian webmail with the default secure login checkbox turned off. Don't forget, this is not an Open WiFi network, but one with WPA2 protection!


Session hijack

Now let's assume that the victim is very security-aware and he checks the secure login checkbox. Another cause can be that the victim already logged in, long before we started to attack. The session hijacking function is similar to the Firesheep tool, but it works with every website where the session cookies are sent in clear text, and there is no need for any additional support.

In a session hijacking attack (also called "sidejacking"), after the victim browser sends the authentication cookies in clear text, DSploit copies these cookies into its own browser, and opens the website with the same cookies, which results in successful login most of the time. Let's see session hijacking in action!

Here, we can see that the session cookies have been sniffed from the air:


Let's select that session, and be amazed that we logged into the user's webmail session.




Redirect traffic

This feature can be used both for fun or profit. For fun, you can redirect all the victim traffic to http://www.kittenwar.com/. For-profit, you can redirect your victim to phishing pages.


Replace images, videos

I think this is just for fun here. Endless Rick Rolling possibilities.


Script injection

This is mostly for profit. client-side injection, drive-by-exploits, endless possibilities.

Custom filter

If you are familiar with ettercap, this has similar functionalities (but dumber), with string or regex replacements. E.g. you can replace the news, stock prices, which pizza the victim ordered, etc. If you know more fun stuff here, please leave a comment (only HTTP scenario - e.g. attacking Facebook won't work).

Additional fun (not in DSploit) - SSLStrip 

From the MITM section of DSploit, I really miss the SSLStrip functionality. Luckily, it is built into the Pwn Pad. With the help of SSLStrip, we can remove the references to HTTPS links in the clear text HTTP traffic, and replace those with HTTP. So even if the user checks the secure login checkbox at freemail.hu, the password will be sent in clear text - thus it can be sniffed with DSniff.

HTML source on the client-side without SSLstrip:


HTML source on the client-side with SSL strip:


With EvilAP, SSLStrip, and DSniff, the password can be stolen. No hacking skillz needed.

Lessons learned here

If you are a website operator where you allow your users to login, always:
  1. Use HTTPS with a trusted certificate, and redirect all unencrypted traffic to HTTPS ASAP
  2. Mark the session cookies with the secure flag
  3. Use HSTS to prevent SSLStrip attacks
If you are a user:
  1. Don't trust sites with your confidential data if the above points are not fixed. Choose a more secure alternative
  2. Use HTTPS everywhere plugin
  3. For improved security, use VPN
Because hacking has never been so easy before.
And last but not least, if you like the DSploit project, don't forget to donate them!
Continue reading

  1. Hack Tools Online
  2. Pentest Recon Tools
  3. Hacking Apps
  4. Pentest Tools Alternative
  5. Hacker Tools 2019
  6. Hacking Tools Kit
  7. Black Hat Hacker Tools
  8. Bluetooth Hacking Tools Kali
  9. Pentest Tools Kali Linux
  10. Pentest Tools Linux
  11. Hack Tools Github
  12. Hack Tools
  13. Pentest Tools Download
  14. Hacker Security Tools
  15. Hack Tool Apk
  16. Hacker Tools For Ios
  17. Hack Apps
  18. Top Pentest Tools
  19. Hack Tools Pc
  20. Hack Tools Download
  21. Pentest Tools Bluekeep
  22. Hack App
  23. Hacker Tool Kit
  24. Hack Tool Apk No Root
  25. Hack Apps
  26. Hack Tools For Windows
  27. Hacking Tools For Windows Free Download
  28. Blackhat Hacker Tools
  29. Hacking Tools 2019
  30. Easy Hack Tools
  31. Hacker Tools Software
  32. Hack Apps
  33. Pentest Tools Nmap
  34. Hacking Tools Online
  35. Kik Hack Tools
  36. How To Hack
  37. Top Pentest Tools
  38. New Hacker Tools
  39. Computer Hacker
  40. Pentest Tools Linux
  41. Pentest Tools Online
  42. Tools 4 Hack
  43. Hacker Tools Free Download
  44. Pentest Automation Tools
  45. Hacker Tools For Ios
  46. Nsa Hack Tools
  47. How To Make Hacking Tools
  48. Github Hacking Tools
  49. Pentest Tools Github
  50. Hacking App
  51. Pentest Tools Bluekeep
  52. Hack And Tools
  53. Ethical Hacker Tools
  54. Hack App
  55. Pentest Tools Online
  56. Hacking Tools 2020
  57. Pentest Automation Tools
  58. Hacker Tools For Windows
  59. Hacking Tools For Games
  60. Bluetooth Hacking Tools Kali
  61. Hacking Tools Github
  62. Tools 4 Hack
  63. Hacking Tools Download
  64. Hacker Tools For Ios
  65. Pentest Tools Review
  66. Hacker Techniques Tools And Incident Handling
  67. Pentest Tools Tcp Port Scanner
  68. Bluetooth Hacking Tools Kali
  69. Hacking Tools 2020
  70. Hacker Tools Software
  71. Hacking Tools And Software
  72. Hacker Tools For Mac
  73. Pentest Tools Website
  74. How To Make Hacking Tools
  75. Hacker Tools Free Download
  76. Hacker Tools For Windows
  77. Black Hat Hacker Tools
  78. Hacker Tools For Pc
  79. Hacking Tools And Software
  80. Termux Hacking Tools 2019
  81. Best Hacking Tools 2020
  82. Hacker Security Tools
  83. Easy Hack Tools
  84. Nsa Hack Tools Download
  85. Wifi Hacker Tools For Windows
  86. Hacker Tools Hardware
  87. Hacker Tools For Pc
  88. Black Hat Hacker Tools
  89. Hacking Tools For Windows
  90. Hacking Tools Windows 10
  91. Hack And Tools
  92. Hacking Tools For Beginners
  93. Hacker Tools For Windows
  94. Hacker Tools Free Download
  95. Hacking Tools And Software
  96. Hacker Tools For Ios
  97. Hacking Tools For Windows
  98. Hacking Tools Mac
  99. Hacking App
  100. Pentest Tools Website
  101. Hacker Hardware Tools
  102. Hacker Tool Kit
  103. Pentest Tools Linux
  104. Computer Hacker
  105. Physical Pentest Tools
  106. Hacker Tools List
  107. Hack Rom Tools
  108. Hackrf Tools
  109. Hacker Tools Mac
  110. Hackrf Tools
  111. Pentest Tools Framework
  112. Hack Website Online Tool
  113. New Hack Tools
  114. Top Pentest Tools
  115. Hacking Tools Name
  116. Hack Tools
  117. Kik Hack Tools
  118. Hacker Tools List
  119. Hacker Tools For Mac
  120. Hack Apps
  121. Hacking Apps
  122. Hacking Tools Hardware
  123. Tools 4 Hack
  124. Hacker Tools For Ios
  125. Easy Hack Tools
  126. Hacking Tools For Games
  127. Nsa Hacker Tools
  128. Pentest Tools Bluekeep
  129. Hacker Hardware Tools
  130. Ethical Hacker Tools
  131. How To Make Hacking Tools
  132. Kik Hack Tools
  133. Hacking Tools Mac
  134. Pentest Tools Online
  135. Nsa Hack Tools
  136. Pentest Tools Android
  137. Hacking Tools 2020
  138. Best Hacking Tools 2020
  139. Game Hacking
  140. Top Pentest Tools
  141. What Is Hacking Tools
  142. Wifi Hacker Tools For Windows
  143. Hack Tools Github
  144. Termux Hacking Tools 2019
  145. How To Hack
  146. Hacking Tools
  147. Bluetooth Hacking Tools Kali
  148. Pentest Tools Subdomain
  149. Best Pentesting Tools 2018
  150. Usb Pentest Tools

No comments:

Post a Comment