How Hackers Use Xerosploit for Advanced MiTM Attacks

Sdílet
Vložit
  • čas přidán 7. 06. 2021
  • Our Premium Ethical Hacking Bundle Is 90% Off: nulb.app/cwlshop
    Advanced Man-in-the-Middle Attacks with Xerosploit
    Full Tutorial: nulb.app/z8y1k
    Subscribe to Null Byte: goo.gl/J6wEnH
    Kody's Twitter: / kodykinzie
    Cyber Weapons Lab, Episode 222
    Bettercap is the go-to tool that hackers use for many man-in-the-middle attacks, but it can often require a lot of customization. In this episode of Cyber Weapons Lab, we'll look at Xerosploit, which helps to automate a lot of that process. We'll also explore its limitations.
    To learn more, check out the article: nulb.app/z8y1k
    Follow Null Byte on:
    Twitter: / nullbyte
    Flipboard: flip.it/3.Gf_0
    Website: null-byte.com
    Vimeo: vimeo.com/channels/nullbyte
  • Jak na to + styl

Komentáře • 492

  • @scrim1000
    @scrim1000 Před 5 měsíci +5

    damn it's been almost 3 years no content, i used to watch yall all of quarantine

  • @e0n662
    @e0n662 Před rokem +26

    Man, what happened to this channel? No recent uploads now? You guys really helped me cope during the pandemic 😥😥😥

    • @thegipset5327
      @thegipset5327 Před rokem +2

      Idk about what happened to this channel, but i Saw kody in some of hak5's videos

    • @davidseddon2157
      @davidseddon2157 Před rokem +9

      He regularly posts on his new channel SecurityFWD, same awesome content 😁

    • @thewatchman_returns
      @thewatchman_returns Před rokem +6

      @@davidseddon2157 thanks legend

  • @justins2599
    @justins2599 Před 2 lety +33

    This guy is awesome . Straight to the point , no gimmic , easy to follow instructions.

    • @ragheedemail
      @ragheedemail Před rokem +1

      True👌

    • @Vazzible_gaming
      @Vazzible_gaming Před 11 měsíci

      Maybe no gimmic, however, no particular part of “hacking machines” is easy to explain.

  • @he-dp3mk
    @he-dp3mk Před 2 lety +12

    Why aren't they uploading anymore?

  • @metaversalthreat
    @metaversalthreat Před 2 lety +160

    Is my boy in jail or something, we got 11 months without content. Anyone got answers?

    • @singsong5824
      @singsong5824 Před 2 lety +20

      Account got banned he cant upload

    • @patrick_batman7
      @patrick_batman7 Před rokem +2

      @@singsong5824 Why bro?

    • @birdnest17
      @birdnest17 Před rokem +16

      They got no funding due to covid so they stopped uploading on this channel if you search his name he works for another channel now that he frequently uploads on

    • @0ffGridTechClub
      @0ffGridTechClub Před rokem

      I was wondering the same thing !

    • @yoprojulian
      @yoprojulian Před rokem +4

      He stoped uploading on this channel cause they weren’t paying enough I’m pretty sure, he is now uploading on the channel hak5

  • @Alkhachi3a
    @Alkhachi3a Před 2 lety +10

    Why your channel is no longer active ?

  • @italoamaya8230
    @italoamaya8230 Před 3 lety

    hey what mac apps do you use you have a bunch in your status bar

  • @thomashedrick8446
    @thomashedrick8446 Před 2 lety +1

    Does this work if you know the ip of someone connected through a differen network or is only for someone on the same network????

  • @kumarrohan6148
    @kumarrohan6148 Před rokem

    do we have to keep kali on NAT or Bridged mode?

  • @uprisingstorm2493
    @uprisingstorm2493 Před 2 lety +6

    It's been 7 months.. Miss ur content guys!

  • @ManojManu-xz2cm
    @ManojManu-xz2cm Před 3 lety

    Sir how to buy the complete ethical hacking cource in ur website

  • @bennybo5656
    @bennybo5656 Před 3 lety

    yo i need help i just got my raspberry pi and it cannot find the file for kernel where can i get and how to update it

  • @rd._874
    @rd._874 Před 2 lety +5

    Where are you Null…

  • @aronnorahman291
    @aronnorahman291 Před 3 lety

    Does this attack required a external wi-fi adapter?

  • @ayushsinha614
    @ayushsinha614 Před 3 lety

    when i install mitmf and then type ./mitmf it said import error no module name pyinotify when I install xerosploit and run one of its attack name replace then it said there is no module name PIL please help

  • @tomo7451
    @tomo7451 Před rokem

    where did you get that sticker on your laptop?

  • @cryproot9845
    @cryproot9845 Před 2 lety

    I have started in this beautiful world of content on CZcams, I am new to this and here we go with issues of cybersecurity and ethical hacking

  • @stolas_ars_goetia.
    @stolas_ars_goetia. Před 3 lety

    does it works with hsts protocol?

  • @Pixelsvideos420
    @Pixelsvideos420 Před 2 lety

    To do these attacks are we need to connect with same wifi network

  • @ayushsinha614
    @ayushsinha614 Před 3 lety

    When i try the command replace it said module notfound error no module name PIL please help

  • @dynaa4168
    @dynaa4168 Před 2 lety +2

    Can u make terminal bigger? It's so small. Or at least put the commands on the screen in a text.

  • @user-sn7uj6nr9k
    @user-sn7uj6nr9k Před 10 měsíci

    Please sir, I can't run monitor mode and packet injection on my internal wireless card. I'm using Nexus 6p device. I've flashed the nexmon patch but doesn't work still.

  • @revo581
    @revo581 Před rokem

    Hey null is there any platform to learn more about ethical hacking

  • @yeet--
    @yeet-- Před 3 lety +161

    this is a certified hood classic

  • @arindammoitra3443
    @arindammoitra3443 Před 3 lety +1

    You did awesome works.....I have a question ..Is it possible Android device can be attacked ? And some bad guys control its full function or steal data... By sending links or illegal app......

  • @MisterOhNo
    @MisterOhNo Před 3 lety

    Does anyone know how i can get a proxy list

  • @donatellodedon3951
    @donatellodedon3951 Před 2 lety +1

    Hey please help me My phone has a GSM paying account blocker that I have to pay so as to use my Samsung galaxy A03 .I want to remove it

  • @slacortes2975
    @slacortes2975 Před 3 lety +1

    NEED HELP! I need to change the link of 3 qr codes, because I did it on the QR Code Generator website and didn't know it was a test for 14 days. If that's not possible I would like the app hacked or cracked QR Code Generator because I need the paid version and I don't have the value. :^(

  • @sergiyrr5153
    @sergiyrr5153 Před 2 lety

    pls help: sh: 1: xettercap: not found
    wont let use the tool

  • @SimSpark1
    @SimSpark1 Před 2 lety

    how do you know if someone else is doing this to you? and how to end it quickly? we do need to learn both ways dont we?!! i use my network also for affliating and using traffic, so can i use vpn than? since all these providers and sogtwareplatforms run on links...how is this organized?

  • @memyselfandimemy3498
    @memyselfandimemy3498 Před 2 lety +2

    Hie Kody, I have a quick question about hydra. How do you create a password list if you remember part of the password? For example if I was using hashcat I know i would write something like pass a?s?#?2. What is the hydra equal of that?

  • @anikrish96
    @anikrish96 Před 10 měsíci

    am getting below errors:
    E: Package 'python-pip' has no installation candidate
    and
    ERROR: Error installing xerttercap-1.5.7xerob.gem:
    ERROR: Failed to build gem native extension.
    make failed, exit code 2

  • @sofukanal8687
    @sofukanal8687 Před 2 lety +4

    anybody other than me that has noticed this was his last video? like his was 11 months ago

  • @abbasabbaskhan1582
    @abbasabbaskhan1582 Před 2 lety

    Bro can you tell me how to access member in what's app group without permission for hacking code

  • @anujChandlaCh
    @anujChandlaCh Před 2 lety +1

    someone's please tell me how to decrypt lqqw virus corrupted files . i already tried emisoft type decriptor tools but nothing happens. so anyone knows any other else method please suggest. 😔

  • @user-qs8fl4mg1v
    @user-qs8fl4mg1v Před 2 lety

    Really appreciate the background music, anyone know what it is ?

  • @shreytalati7365
    @shreytalati7365 Před 3 lety +21

    Cyberweapons lab is like my goto tutorials

  • @kranthibendalam4757
    @kranthibendalam4757 Před 3 lety

    Can u give the book names behind u in cupboard...

  • @sauravkhakurel2648
    @sauravkhakurel2648 Před 3 lety

    it does not seem to run on kali 2021.2. Need Help

  • @sz3066
    @sz3066 Před 3 lety

    Why i met this problem... Can anyone help?
    ** (driftnet:2115): WARNING **: 13:40:14.085: (../atk-adaptor/bridge.c:1018):atk_bridge_adaptor_init: runtime check failed: (root)

  • @nonenon4815
    @nonenon4815 Před 2 lety

    Cuánto cobras por asesoramiento. Necesito reconstruir mi sistema. Y blindarlos. Existe un batch ejecutable en mi PC. Es necesario programar en python para desmontar el hackyng?

  • @stephpress9433
    @stephpress9433 Před 2 lety

    would like to know my router has been exploited what can I do to remove someone who is hacking my router and devices on the router. I have called spectrum and they have done nothing and say its my computer. The hacker has hacked cellphones emails tablets and all devices what do you recommend. God bless Steph

  • @mehdinouira3540
    @mehdinouira3540 Před měsícem

    how to create a script that detect changes on directory and remove malwayres

  • @yashsah4522
    @yashsah4522 Před 3 lety

    hlo plz can help can u tell me that how to deleta ransomware virus from
    computer

  • @arshmohania6694
    @arshmohania6694 Před 3 lety +32

    Xerosploit is made on python2 so running it on machine where python3 is already installed you will need to change a few parts.

  • @kanpitcha54
    @kanpitcha54 Před 3 lety

    Hi! what is the full title of the book on the shelf? "Codes, ..." I see it in almost every videos and I just couldn't find it anywhere. Thank you in advance!

    • @nitra01
      @nitra01 Před 3 lety

      it's "Codes, Ciphers, Secrets and Cryptic Communication"

    • @kanpitcha54
      @kanpitcha54 Před 2 lety

      @@nitra01 thank you sir!

  • @lahirusanjika4904
    @lahirusanjika4904 Před 2 lety

    can i track someone location with iemi number toutorial need

  • @An_American_Boy
    @An_American_Boy Před rokem

    Could someone please tell me what else can we do with an IP address?

  • @GMendoza1
    @GMendoza1 Před 3 lety +7

    Me encantaria que tuviera subtitulos en español, ya que apenas ando aprendiendo ingles.

  • @henrysmith5266
    @henrysmith5266 Před rokem

    My pc was remotely hacked and how do I a novice attempt to fix it

  • @sergiyrr5153
    @sergiyrr5153 Před 2 lety

    some one help i dont get the splash screen, its like my vm just switched directories. ( i did type "xerosploit", with no other chars )

  • @xav9701
    @xav9701 Před 2 lety

    i keep getting a traceback error while trying to install that says something like “main function is not defined” and i don’t totally understand how to fix it, anybody know?

  • @durgaprasadrao3888
    @durgaprasadrao3888 Před 2 lety

    can you pls make one video for android keylogger how to remotely access information through the victim device sir

  • @kaminoanagressor9256
    @kaminoanagressor9256 Před rokem +4

    we want you back bro!

  • @_Omni
    @_Omni Před 2 lety +1

    Where did u go?

  • @oscarthuo8639
    @oscarthuo8639 Před 2 lety

    Hi I just lost my oppo phone. Anyone know how to track it!

  • @preetamsingh7496
    @preetamsingh7496 Před 2 lety

    Unable to use with python3
    Can you help

  • @dark_legions2227
    @dark_legions2227 Před 2 lety

    when i run the command xerosploit it doesnt initiate i made sure all packages were installed but still no response. I m currently using kali linux latest version...so plzz help...

    • @user-qs8fl4mg1v
      @user-qs8fl4mg1v Před 2 lety

      I think xeroexploit only works with python2 ...so do sudo python instead of sudo python3

  • @ypitchireddy2008
    @ypitchireddy2008 Před 3 lety

    Can you tech to protect against from joker malware

  • @heroiuraresjustinian4681
    @heroiuraresjustinian4681 Před 2 lety +1

    Where did they go?

  • @rajkumar-vl7il
    @rajkumar-vl7il Před 3 lety

    Please zoon it and Increase the font very hard to see it on mobile

  • @kevinhawthorne5257
    @kevinhawthorne5257 Před 2 lety +1

    Thank You for all of your videos that you did. I am enjoying all of them

  • @tochukwuokeke5348
    @tochukwuokeke5348 Před 3 lety +1

    Can you use these mitm on wan or just lan

  • @ffgemar160
    @ffgemar160 Před 2 lety +1

    Blue brown Bluetooth attack toll kaise download 🙏🙏

  • @lilnx1406
    @lilnx1406 Před 3 lety

    it says xerosploit command not found

  • @mpasite7649
    @mpasite7649 Před 3 lety +10

    Kody you are one of the BEST teachers in 2021 :)

    • @expertforexandbinary676
      @expertforexandbinary676 Před 3 lety

      I want forex market hecking software ☺️

    • @HK-sw3vi
      @HK-sw3vi Před 3 lety

      bruh he's just teaching you how to be a script kiddie. real hackers understand the fundamentals.

  • @jaygeemmo
    @jaygeemmo Před 2 lety +5

    I love your videos you've made tall this an easy as can be guide and have gotten me back into ethical hacking . nice.

  • @meetoo2082
    @meetoo2082 Před 9 měsíci

    I get hacked attacked and I've been hack attacked for eight years off and on. I have erased and reset so many computers and also gotten frustrated with certain computers and just erase them and sold them again. I get black Papa boxes that look like they're Colonel boxes but they're not really they changed my system. The last time that I got this less than a week ago I reset the computer. Then I started the computer again and the second time I restarted my computer I had not one or two like I usually have a black pop-up boxes I had four. Now my ability to reset is completely compromised I can go into the recess set and I can't reset anything it just it it it says that my reset environment isn't available to take a Windows USB and try to restart my computer that way. Well I tried the USB trick, no go. How do I deal with such a fool?

  • @maurolimaok
    @maurolimaok Před 24 dny

    Don´t let the channel die.
    This is a great one.

  • @creepygirl4706
    @creepygirl4706 Před 2 lety

    How to eavesdrop on a phone call please reply me

  • @HARMEETSINGH-fr4gz
    @HARMEETSINGH-fr4gz Před 2 lety +3

    bro where are you?... waiting for your videos

  • @Living_AI
    @Living_AI Před 2 lety

    where are you running those codes? I wanna know the compiler name

  • @ashmitrana6923
    @ashmitrana6923 Před rokem

    Why are there no new videos

  • @charanreddy8856
    @charanreddy8856 Před 2 lety +3

    Hey everybody! request Kody to make a video on MITRE ATT&CK framework and also the tools used in each section of that framework. Thanks

  • @wafttv
    @wafttv Před 3 lety

    Please make a video on best bluetooth adapters for hacker. I can't find the good one. My neighbours are very unsocial they don't listen to us. So, I want to ddos on there bluetooth device. So please explain on a video.

  • @abdullaheldrbaly
    @abdullaheldrbaly Před rokem

    Hello code can i ask you afavor please

  • @s7ifx189
    @s7ifx189 Před 3 lety

    Laptop name ?

  • @mcmegaplus
    @mcmegaplus Před 2 lety

    Can I have a tutorial on how to track lost phone using IMEI

  • @jesperjensen293
    @jesperjensen293 Před 3 lety

    If you install a vpn directly on your router, will it still be possible for a hacker to sniff the traffic if he somehow got access to the wifi network ?

    • @HOPE_-lo8mz
      @HOPE_-lo8mz Před 3 lety +2

      The router's traffic will get diverted to different public IP addresses and hence, hackers won't be able to sniff your traffic.

    • @abbimilagon5499
      @abbimilagon5499 Před 3 lety +3

      Yes you can. Doesn't matter where the IP address is. VPNs Don't stop hacker's or government . Like Nord VPN was hacked. Anything can be watched and hacked.

    • @uniquechannelnames
      @uniquechannelnames Před 2 lety +1

      If he got on to the same network, umm im not sure exactly. If there was a network with a phone connected and that phone had a VPN then no you couldnt. But if no one had a VPN except the router, im not sure if you could sniff other traffic or if it would encrypt all connections.

  • @tomashublik5586
    @tomashublik5586 Před 3 lety +7

    Finally MiTM :) Thanks.

  • @communist_demon4177
    @communist_demon4177 Před 3 lety

    why is he doing the full thing?

  • @user-vt1rb1wy3u
    @user-vt1rb1wy3u Před rokem +1

    btw, you should:
    type chmod +x xerosploit to be able to execute it
    then type start before putting in an ip address

  • @manjunath7472
    @manjunath7472 Před 2 lety +2

    Where did u go?
    Its been 9 months

  • @user-yq9fg9xv9l
    @user-yq9fg9xv9l Před 4 měsíci

    How to hack without touching my area surroundings Android Mobiles..?

  • @mdmasudkhan6740
    @mdmasudkhan6740 Před 3 lety +1

    Sir I from bangladesh Sir hi can I please send u the screenshort and can u please make the texts visible pless

  • @quranlovers.
    @quranlovers. Před 2 lety

    Sir can you make a video on Kali Linux in mobile useage

  • @stophackingonetimemail956

    i need help! i know who is doing all this to me can you help me prove it in court?

  • @fasteddy6147
    @fasteddy6147 Před 2 lety +1

    What's the safest way to pen test (Hack)? Dual boot Windows with Linux
    flavor of choice? Running Linux distro by itself? Or running Linux via
    VM or Containers within Windows?

    • @smg1336
      @smg1336 Před 2 lety

      Dual booting with windows + Kali/Parrot is the most popular option

    • @giddy4600
      @giddy4600 Před 2 lety

      @@smg1336 it’s not
      Most people use vms
      I daily drive endeavour and I still use vms most of the timr

    • @youtube.user.1234
      @youtube.user.1234 Před 2 lety

      Vim should be best because it’s isolated from your host system .. but I’m not sure I haven’t really used kali Linux I use other Linux distros

  • @shumovpt8390
    @shumovpt8390 Před 2 lety

    Can someone help/teach me on how to mitm a bluetooth speaker connection pls?

  • @no_winger
    @no_winger Před 3 lety +4

    Plzz make a video how to install metasploit and brup suite in ubantu

    • @epitome5845
      @epitome5845 Před 3 lety +1

      just go search burp suite download. for metasploit, there are tons of tutorials.

  • @NaMeLeSs-yo3lb
    @NaMeLeSs-yo3lb Před 2 lety

    Are macs the best choice for hacking and pen testings?

  • @victorcesar8314
    @victorcesar8314 Před 3 lety +4

    How would I get into someone else's network to actually perform this attack in the first place?

    • @bladea_boi5104
      @bladea_boi5104 Před 3 lety +1

      exactly

    • @alainportant6412
      @alainportant6412 Před 3 lety +3

      maybe you could try asking nicely

    • @albertreign
      @albertreign Před 2 lety

      @@alainportant6412 👏😀

    • @almightypush6888
      @almightypush6888 Před 2 lety +2

      @@bladea_boi5104 theres a command called start instead of using scan use start then type the victims ip4 address

    • @kellysmith7357
      @kellysmith7357 Před 2 lety +3

      if youre asking that youre going to end up going to jail lol

  • @Zeeye
    @Zeeye Před 3 lety

    this only works for things over non-secure connections right?

  • @therealsuryansh
    @therealsuryansh Před 3 lety

    This is not working in Parrot OS (virtual). Terminal tables error..line 26 error. Help me!

    • @therealsuryansh
      @therealsuryansh Před 3 lety

      @@zane08 I have already installed all dependencies. Still it's showing me errors.

    • @therealsuryansh
      @therealsuryansh Před 3 lety

      @@zane08 xerosploit is not working in python. It's working in only python3. Can you please tell me the commands through which i can install all dependencies in python?

  • @zabalata01
    @zabalata01 Před 3 lety

    Can give us some about zero click vulnerability? Thnx if yes we wait

  • @omerfaruksonmez5668
    @omerfaruksonmez5668 Před 2 lety +1

    Ayoo where are new episodes???

  • @venomx2131
    @venomx2131 Před 2 lety +1

    hey bro why are you not making videos

  • @RakibHasan-hs1me
    @RakibHasan-hs1me Před 2 lety

    Could guys made video on proxy tunneling, using kali tools.

  • @woofwoofmotherfuckers
    @woofwoofmotherfuckers Před 3 lety +1

    Beauty of python is this installed perfectly on Google cloud console but soon as I tried on Kali it didn't yay

  • @teamgamers8578
    @teamgamers8578 Před 9 měsíci

    little bit of zoom in terminal will be helpful to see thank you