12/5/2023 0 Comments Kali Linux Nethunter![]() Once you click the “DNS Spoofing” button you will be presented with an Ettercap config screen. We can use the DNS spoofing button to redirect the target system to a system we control. Once this is done, you can then click the “Exploit Finder” button to try to find exploit for any vulnerabilities found during the Service inspection. Service inspector runs an indepth scan with service detection. Trace and port scanner are self-explanatory. You will then be shown a list of all the network devices along with their name, MAC & IP addresses along with how many ports were detected on each device.Ĭlicking an individual target will give you a list of scans and attacks that can be run against the target: It will immediately perform an extremely quick scan of all systems connected to the network. Just tap the cSploit icon to start the application. cSploit is probably the fastest way on the phone to scan a connected network and perform basic attacks, including MitM. MitM DNS Spoofing with cSploitĪlong with the Kali tools, Nethunter also installs several additional tools that are very helpful to a penetration tester including cSploit. Of course you can also run Nmap scans, start Kali Services and several other things.ĭon’t forget as well, that you have many of the Kali tools installed in the file system itself, so you can open a terminal and run them just as you would on a regular Kali system. There is also the MITM Framework which allows you to do more advanced MITM attacks than we will cover today. This allows you to turn your phone into an evil USB keyboard that actually types commands on the target system when your phone is connected. There are some great tools here like “HID attacks”. Kali Nethunter installs multiple tools found in a regular Kali Linux install and presents you with a nice menu system under the “Nethunter” icon: When Nethunter boots up it looks like any other Android phone, other than the epic Kali booting screen that is. ![]() Three systems will be used in this article – The smartphone running Nethunter, a test target system running Windows 7 and a third computer running Kali Linux.Īll right, enough talk, let’s get to it! Using Nethunter As with modifying any smartphone, there is a possibility that the phone could be bricked in the process, turning your favorite phone into an expensive drink coaster. Installing Nethunter involves wiping your phone, installing new and custom firmware and rooting it. If you install Nethunter on your phone, you do so at your own risk. And as this could be easily misused, I will not show all the steps in this process, only show how the attack could be set up.Īlso, I will not show how Nethunter is installed. Though DNS spoofing attacks are not new, it is just so easy to do them with Nethunter. Doing so could get you into serious legal trouble and you could end up in jail. Nethunter is an adaptation of the most excellent Kali Linux penetration testing platform re-invented for use on smartphones.Īs always, it is illegal to attempt to access or modify a system that you do not have express written permission to do so. If you haven’t played with Nethunter yet, it is one of the coolest things since sliced bread. Well, what if that different website was a Kali Linux system running Social Engineering attacks? Introduction This would allow you to divert a system surfing the web (without ever physically touching the target) to a different website. Of course you can do all the normal MitM type attacks but what is nice is that you can also do DNS spoofing. Using Kali Nethunter & cSploit on your Android phone, you can fairly easily perform a Man-in-the-Middle attack on target systems. How cool would it be as a pentester to walk around a target company, with only your smartphone, and divert individual systems surfing the web to an outside Kali Linux system you have setup that is just waiting for incoming connections.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |