Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different modules that permit to acknowledge proficient assault and furthermore permits to do DOS attacks and port filtering.

We can use this tool to perform DOS, MITM attacks, also the tool has driftnet modules which capture images and also it will be used in performing Injection attacks. It was Committed by LionSec1, it is a powerful and simple to use the tool.

Also Read: Master in Ethical Hacking & Penetration Testing Online – Scratch to Advance Level

Tool Dependencies

nmap

hping3

build-essential

ruby-dev

libpcap-dev

libgmp3-dev

tabulate

terminaltables

Tool Features

Port scanning

Network mapping

Dos attack

Html code injection

Javascript code injection

Download interception and replacement

Sniffing

DNS spoofing

Background audio reproduction

Images replacement

Drifnet

Webpage defacement and more.

Kali Linux Tutorial – Xerosploit

To clone Xerosploit git clone https://github.com/LionSec/xerosploit and to run installation sudo python install.py

Need to select your operating system and to launch type Xerosploit.

Just need to type help to view all the commands.

First, we need to scan the network to map all the devices. Xero scan

Then select the target IP address and type help.

You can select any Module to attack, let’s we start with port scanner pscan.

Next, we go on try launching a Dos attack, for examining packets we have configured Wireshark in the recipient system.

Type back to go the main menu and then dos >> run to perform the attack.

Now let’s try sniffing the images what your friend seeing in his computer.

Once the attack launched we can sniff down all the images that he is viewing on his computer in our screen.

We can do much more with this tool simply by using the move you can shake the browser contents and with Yplay you can make audios to play in the background.

Download: Free GDPR Comics Book – Importance of Following General Data Protection Regulation (GDPR) to protect your Company Data and user privacy

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Disclaimer