DSploit - EMEL

Latest

Friday, January 19, 2024

DSploit

DSploit

After playing with the applications installed on the Pwn Pad, I found that the most important application (at least for me) was missing from the pre-installed apps. Namely, DSploit. Although DSploit has tons of features, I really liked the multiprotocol password sniffing (same as dsniff) and the session hijacking functionality.

The DSploit APK in the Play Store was not working for me, but the latest nightly on http://dsploit.net worked like a charm.

Most features require that you and your target uses the same WiFi network, and that's it. It can be Open, WEP, WPA/WPA2 Personal. On all of these networks, DSploit will sniff the passwords - because of the active attacks. E.g. a lot of email clients still use IMAP with clear text passwords, or some webmails, etc. 

First, DSploit lists the AP and the known devices on the network. In this case, I chose one victim client.


In the following submenu, there are tons of options, but the best features are in the MITM section. 


Stealthiness warning: in some cases, I received the following popup on the victim Windows:


This is what we have under the MITM submenu:


Password sniffing

For example, let's start with the Password Sniffer. It is the same as EvilAP and DSniff in my previous post. With the same results for the popular Hungarian webmail with the default secure login checkbox turned off. Don't forget, this is not an Open WiFi network, but one with WPA2 protection!


Session hijack

Now let's assume that the victim is very security-aware and he checks the secure login checkbox. Another cause can be that the victim already logged in, long before we started to attack. The session hijacking function is similar to the Firesheep tool, but it works with every website where the session cookies are sent in clear text, and there is no need for any additional support.

In a session hijacking attack (also called "sidejacking"), after the victim browser sends the authentication cookies in clear text, DSploit copies these cookies into its own browser, and opens the website with the same cookies, which results in successful login most of the time. Let's see session hijacking in action!

Here, we can see that the session cookies have been sniffed from the air:


Let's select that session, and be amazed that we logged into the user's webmail session.




Redirect traffic

This feature can be used both for fun or profit. For fun, you can redirect all the victim traffic to http://www.kittenwar.com/. For-profit, you can redirect your victim to phishing pages.


Replace images, videos

I think this is just for fun here. Endless Rick Rolling possibilities.


Script injection

This is mostly for profit. client-side injection, drive-by-exploits, endless possibilities.

Custom filter

If you are familiar with ettercap, this has similar functionalities (but dumber), with string or regex replacements. E.g. you can replace the news, stock prices, which pizza the victim ordered, etc. If you know more fun stuff here, please leave a comment (only HTTP scenario - e.g. attacking Facebook won't work).

Additional fun (not in DSploit) - SSLStrip 

From the MITM section of DSploit, I really miss the SSLStrip functionality. Luckily, it is built into the Pwn Pad. With the help of SSLStrip, we can remove the references to HTTPS links in the clear text HTTP traffic, and replace those with HTTP. So even if the user checks the secure login checkbox at freemail.hu, the password will be sent in clear text - thus it can be sniffed with DSniff.

HTML source on the client-side without SSLstrip:


HTML source on the client-side with SSL strip:


With EvilAP, SSLStrip, and DSniff, the password can be stolen. No hacking skillz needed.

Lessons learned here

If you are a website operator where you allow your users to login, always:
  1. Use HTTPS with a trusted certificate, and redirect all unencrypted traffic to HTTPS ASAP
  2. Mark the session cookies with the secure flag
  3. Use HSTS to prevent SSLStrip attacks
If you are a user:
  1. Don't trust sites with your confidential data if the above points are not fixed. Choose a more secure alternative
  2. Use HTTPS everywhere plugin
  3. For improved security, use VPN
Because hacking has never been so easy before.
And last but not least, if you like the DSploit project, don't forget to donate them!
Related word
  1. Tools For Hacker
  2. Hacking Tools For Kali Linux
  3. Hacks And Tools
  4. Hacker Techniques Tools And Incident Handling
  5. How To Install Pentest Tools In Ubuntu
  6. Pentest Tools Nmap
  7. Pentest Automation Tools
  8. Nsa Hack Tools
  9. Hack Tools Github
  10. Best Pentesting Tools 2018
  11. Hacking Tools Free Download
  12. Hack Tools For Games
  13. Pentest Tools Review
  14. Hacker Tools Github
  15. Kik Hack Tools
  16. Hack Tools Online
  17. Hacks And Tools
  18. Hacking Tools Windows 10
  19. Hacking Tools 2019
  20. Hacker Tools Apk Download
  21. Pentest Tools Subdomain
  22. Game Hacking
  23. Hack Tools
  24. Ethical Hacker Tools
  25. Pentest Tools Website
  26. Hacking Tools Software
  27. Hack Tools Pc
  28. Hacking Tools Usb
  29. Easy Hack Tools
  30. Pentest Tools Url Fuzzer
  31. Hacker Tools Free Download
  32. Hacker Tools For Mac
  33. Hacking Tools For Pc
  34. Pentest Tools Framework
  35. World No 1 Hacker Software
  36. Hacking Tools And Software
  37. Hacking Tools
  38. Hacking Tools Software
  39. Tools 4 Hack
  40. Pentest Tools Github
  41. Pentest Tools Android
  42. Hacking Tools Download
  43. Hacker Tools For Mac
  44. Underground Hacker Sites
  45. Hacker Search Tools
  46. Pentest Tools Url Fuzzer
  47. Pentest Tools Online
  48. Hack Website Online Tool
  49. Hack Tools 2019
  50. Hacker Tools
  51. Hack Tools Download
  52. How To Install Pentest Tools In Ubuntu
  53. Hackers Toolbox
  54. Pentest Automation Tools
  55. Hacking Tools For Mac
  56. Pentest Tools Alternative
  57. Hacking Tools For Games
  58. Pentest Tools Website Vulnerability
  59. Hack And Tools
  60. Kik Hack Tools
  61. New Hacker Tools
  62. Hack Tools Pc
  63. Blackhat Hacker Tools
  64. Hack Tools For Windows
  65. Hacking Tools Pc
  66. Hack Tools 2019
  67. Hacker Hardware Tools
  68. Hacking App
  69. Pentest Tools Find Subdomains
  70. Hacking Tools For Pc
  71. Install Pentest Tools Ubuntu
  72. Pentest Tools Kali Linux
  73. Pentest Tools For Ubuntu
  74. Hacking Tools Hardware
  75. Hack Tools Pc
  76. Pentest Tools For Android
  77. What Is Hacking Tools
  78. Pentest Reporting Tools
  79. Hacking Tools Github
  80. New Hack Tools
  81. What Is Hacking Tools
  82. Hacker Tools Apk
  83. Hack Tools Pc
  84. Hacker Hardware Tools
  85. Underground Hacker Sites
  86. Hacking Tools Name
  87. Growth Hacker Tools
  88. Pentest Tools Apk
  89. Hacking Tools Name
  90. Hacker Tools Free
  91. Pentest Tools For Mac
  92. Hacking Tools Github
  93. Hacking Tools For Windows
  94. Best Hacking Tools 2019
  95. Physical Pentest Tools
  96. Pentest Tools Kali Linux
  97. Pentest Tools Website
  98. Hacking Tools For Mac
  99. Pentest Tools Website Vulnerability
  100. Hack Tools
  101. Pentest Tools Website Vulnerability
  102. Hack And Tools
  103. Pentest Tools Open Source
  104. Game Hacking
  105. Pentest Recon Tools
  106. Free Pentest Tools For Windows
  107. Kik Hack Tools
  108. Hacking Tools Name
  109. What Is Hacking Tools
  110. Pentest Automation Tools
  111. Hack Tools Mac
  112. Hack Tools
  113. Hacking Tools Hardware
  114. Pentest Tools Apk
  115. Pentest Tools Url Fuzzer
  116. Hacker Tools Windows
  117. Beginner Hacker Tools
  118. Hacker Tools Apk
  119. Hack Tools For Pc
  120. Hacking Tools Usb
  121. Hacker

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.