Wednesday, May 1, 2024

Xerosploit – Pentesting Toolkit to Perform MITM, Spoofing, Sniffing & DOS Attacks

Xerosploit is a penetration testing toolbox whose objective is to perform man-in-the-middle attacks.

It brings different modules that permit to acknowledge of proficient assault and furthermore permit to do DOS attacks and port filtering.

We can use this tool to perform DOS, and MITM attacks, also the tool has driftnet modules that capture images and also it will be used in performing Injection attacks.

It was Committed by LionSec1, it is a powerful and simple-to-use tool.

Tool Dependencies

  • nmap
  • hping3
  • build-essential
  • ruby-dev
  • libpcap-dev
  • libgmp3-dev
  • tabulate
  • terminaltables

Tool Features

  • Port scanning
  • Network mapping
  • Dos attack
  • Html code injection
  • Javascript code injection
  • Download interception and replacement
  • Sniffing
  • DNS spoofing
  • Background audio reproduction
  • Images replacement
  • Drifnet
  • Webpage defacement and more.

Kali Linux Tutorial – Xerosploit

To clone Xerosploit git clone https://github.com/LionSec/xerosploit and to run installation sudo python install.py

Need to select your operating system and launch type Xerosploit.

Just need to type help to view all the commands.

First, we need to scan the network to map all the devices. Xero  scan

Then select the target IP address and type help.

You can select any Module to attack, let’s start with port scanner pscan.

Next, we go on try launching a Dos attack, for examining packets we have configured Wireshark in the recipient system.

Type back to go to the main menu and then dos >> run to perform the attack.

Now let’s try sniffing the images that your friend sees on his computer.

Once the attack is launched we can sniff down all the images that he is viewing on his computer on our screen.

We can do much more with this tool simply by using the move you can shake the browser contents and with Yplay you can make audio play in the background.

Website

Latest articles

Google Guide! How to Detect Browser Data Theft Using Windows Event Logs

In the ever-evolving cybersecurity landscape, Google is continually striving to protect user data from...

Millions of Malicious “Imageless” Docker Hub Repositories Drop Malware

In a startling revelation, nearly 20% of Docker Hub repositories have been identified as...

Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment,...

How to Utilize Azure Logs to Identify Threats: Insights From Microsoft

Microsoft's Azure platform is a highly acclaimed and widely recognized solution that organizations worldwide...

Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect

The first instance of Redline using such a method is in a new variant...

Threat Actor Claims Selling of Dell Database with 49M User Records

A threat actor reportedly sells a database containing 49 million user records from Dell,...

Google Blocks 2.28M Malicious Apps Entering The Play Store

A safe and trusted Google Play experience is our top priority.We leverage our...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles