Sunday, August 23, 2020

DSploit

DSploit

After playing with the applications installed on the Pwn Pad, I found that the most important application (at least for me) was missing from the pre-installed apps. Namely, DSploit. Although DSploit has tons of features, I really liked the multiprotocol password sniffing (same as dsniff) and the session hijacking functionality.

The DSploit APK in the Play Store was not working for me, but the latest nightly on http://dsploit.net worked like a charm.

Most features require that you and your target uses the same WiFi network, and that's it. It can be Open, WEP, WPA/WPA2 Personal. On all of these networks, DSploit will sniff the passwords - because of the active attacks. E.g. a lot of email clients still use IMAP with clear text passwords, or some webmails, etc. 

First, DSploit lists the AP and the known devices on the network. In this case, I chose one victim client.


In the following submenu, there are tons of options, but the best features are in the MITM section. 


Stealthiness warning: in some cases, I received the following popup on the victim Windows:


This is what we have under the MITM submenu:


Password sniffing

For example, let's start with the Password Sniffer. It is the same as EvilAP and DSniff in my previous post. With the same results for the popular Hungarian webmail with the default secure login checkbox turned off. Don't forget, this is not an Open WiFi network, but one with WPA2 protection!


Session hijack

Now let's assume that the victim is very security-aware and he checks the secure login checkbox. Another cause can be that the victim already logged in, long before we started to attack. The session hijacking function is similar to the Firesheep tool, but it works with every website where the session cookies are sent in clear text, and there is no need for any additional support.

In a session hijacking attack (also called "sidejacking"), after the victim browser sends the authentication cookies in clear text, DSploit copies these cookies into its own browser, and opens the website with the same cookies, which results in successful login most of the time. Let's see session hijacking in action!

Here, we can see that the session cookies have been sniffed from the air:


Let's select that session, and be amazed that we logged into the user's webmail session.




Redirect traffic

This feature can be used both for fun or profit. For fun, you can redirect all the victim traffic to http://www.kittenwar.com/. For-profit, you can redirect your victim to phishing pages.


Replace images, videos

I think this is just for fun here. Endless Rick Rolling possibilities.


Script injection

This is mostly for profit. client-side injection, drive-by-exploits, endless possibilities.

Custom filter

If you are familiar with ettercap, this has similar functionalities (but dumber), with string or regex replacements. E.g. you can replace the news, stock prices, which pizza the victim ordered, etc. If you know more fun stuff here, please leave a comment (only HTTP scenario - e.g. attacking Facebook won't work).

Additional fun (not in DSploit) - SSLStrip 

From the MITM section of DSploit, I really miss the SSLStrip functionality. Luckily, it is built into the Pwn Pad. With the help of SSLStrip, we can remove the references to HTTPS links in the clear text HTTP traffic, and replace those with HTTP. So even if the user checks the secure login checkbox at freemail.hu, the password will be sent in clear text - thus it can be sniffed with DSniff.

HTML source on the client-side without SSLstrip:


HTML source on the client-side with SSL strip:


With EvilAP, SSLStrip, and DSniff, the password can be stolen. No hacking skillz needed.

Lessons learned here

If you are a website operator where you allow your users to login, always:
  1. Use HTTPS with a trusted certificate, and redirect all unencrypted traffic to HTTPS ASAP
  2. Mark the session cookies with the secure flag
  3. Use HSTS to prevent SSLStrip attacks
If you are a user:
  1. Don't trust sites with your confidential data if the above points are not fixed. Choose a more secure alternative
  2. Use HTTPS everywhere plugin
  3. For improved security, use VPN
Because hacking has never been so easy before.
And last but not least, if you like the DSploit project, don't forget to donate them!
Related word

  1. Pentest Tools
  2. Pentest Tools Android
  3. Hacker Techniques Tools And Incident Handling
  4. Hack Rom Tools
  5. Pentest Tools Url Fuzzer
  6. Pentest Tools Alternative
  7. Hacker Tools 2020
  8. Hacking Tools And Software
  9. Underground Hacker Sites
  10. Hak5 Tools
  11. Hacker Tools For Ios
  12. Hack Tools
  13. Hack Apps
  14. Hacking Tools Usb
  15. Pentest Tools Linux
  16. Hak5 Tools
  17. Hacking Tools Pc
  18. Hacking Tools Free Download
  19. Bluetooth Hacking Tools Kali
  20. How To Hack
  21. Pentest Tools Windows
  22. Best Hacking Tools 2020
  23. Hacking Tools For Windows
  24. How To Install Pentest Tools In Ubuntu
  25. Pentest Tools List
  26. Free Pentest Tools For Windows
  27. Pentest Tools Windows
  28. Hacking Tools And Software
  29. Usb Pentest Tools
  30. Hack Tools 2019
  31. Hack Tools Online
  32. Pentest Box Tools Download
  33. Pentest Tools Framework
  34. Hacking Tools For Pc
  35. Hacker Tools 2020
  36. Hacking App
  37. Hacker Tool Kit
  38. Physical Pentest Tools
  39. Nsa Hacker Tools
  40. Hacker Search Tools
  41. Hack Tools For Games
  42. Pentest Tools Subdomain
  43. Hacking Tools Online
  44. New Hack Tools
  45. Hacking App
  46. World No 1 Hacker Software
  47. Pentest Tools Nmap
  48. Pentest Tools Bluekeep
  49. Wifi Hacker Tools For Windows
  50. Android Hack Tools Github
  51. Hacking Tools Kit
  52. Hacker Tools Windows
  53. Hack Tools
  54. Hacker Tools For Ios
  55. Hack Tools Online
  56. Hacker Tools Linux
  57. Hacking Tools Kit
  58. Game Hacking
  59. Growth Hacker Tools
  60. Hacking Tools Windows
  61. Beginner Hacker Tools
  62. Tools 4 Hack
  63. Pentest Tools Framework
  64. Hacker Tools List
  65. Best Pentesting Tools 2018
  66. Hacker Tools For Windows
  67. Pentest Automation Tools
  68. Hacker Tools Software
  69. Pentest Tools Android
  70. Pentest Automation Tools
  71. Hak5 Tools
  72. Pentest Tools Url Fuzzer
  73. Wifi Hacker Tools For Windows
  74. Hack Tools
  75. Hacker Tools Apk
  76. Hacking Tools Mac
  77. Hacker Tools Windows
  78. Pentest Tools Website Vulnerability
  79. Best Pentesting Tools 2018
  80. Pentest Tools Online
  81. Hacker Tools
  82. Hack Tools
  83. Hack Tools For Windows
  84. Pentest Tools Bluekeep
  85. Pentest Tools For Windows
  86. Hacker Tools Mac
  87. Hack Tools For Mac
  88. Hacking Tools For Pc
  89. Hacker Tools Mac
  90. Hacking Tools Download
  91. Hacking Tools For Kali Linux
  92. Pentest Box Tools Download
  93. Hacking Tools Free Download
  94. New Hack Tools
  95. Hack Tool Apk No Root
  96. Hacking Apps
  97. Hack Tools Mac
  98. Hacking Tools For Windows Free Download
  99. Nsa Hacker Tools
  100. Hackrf Tools
  101. Pentest Tools Alternative
  102. Pentest Tools Tcp Port Scanner
  103. Pentest Tools Apk
  104. Pentest Box Tools Download
  105. Best Hacking Tools 2019
  106. Hacking Tools Download
  107. Android Hack Tools Github
  108. Hacking Tools 2019
  109. Hacking Tools Github
  110. Kik Hack Tools
  111. Hacking Tools Windows 10
  112. Hacking Tools 2020
  113. Hacks And Tools
  114. Hacking Tools 2019
  115. Best Pentesting Tools 2018
  116. Pentest Tools Nmap
  117. Hackers Toolbox
  118. Pentest Tools Find Subdomains
  119. Beginner Hacker Tools
  120. Pentest Tools Free
  121. World No 1 Hacker Software
  122. Hacker Tools
  123. Pentest Tools
  124. How To Install Pentest Tools In Ubuntu
  125. Top Pentest Tools
  126. Hacking Tools For Kali Linux
  127. Hackers Toolbox
  128. Pentest Tools Nmap
  129. Best Pentesting Tools 2018
  130. Easy Hack Tools
  131. Hacker Tools
  132. Termux Hacking Tools 2019
  133. Hacking Tools For Kali Linux
  134. Hacker Tools Software
  135. Hackrf Tools
  136. Pentest Reporting Tools
  137. Best Pentesting Tools 2018
  138. Hacking Tools Windows

No comments:

Post a Comment