BadB
Professional
- Messages
- 2,563
- Reaction score
- 2,770
- Points
- 113
You will need:
1. Android Phone.
2. The Busy Box Library.
3. dSploit Program.
4. ROOT rights.
Instruction manual:
1. Install ROOT rights (I Recommend using KingRoot)
2. Install BusyBox
3. Install dSploit
4. Install the BusyBox library itself
5. If you have a KingRoot program, it can block root for dSploit
So go to KingRoot and remove the ban.
6. Run dSploit and see the following.
All the things I've hidden are my MAC and IP addresses
Remark: since the author is located in Ukraine, to access the FB, he has to open a VPN, which in turn does not allow him to intercept the session. So the rest of the story will be based on the example of TELEGRAM.
(everything is the same as with Facebook, really no differences).
Telegram Account.
Victim logs in to Telegram.
At this time, we choose the victim.
Next, select MITM.
Next Session Hijacker.
Then click Start and intercept the session.
Voila!
These actions can be repeated with almost any site, thereby gaining access to many accounts, since sessions can be stored and used later.
1. Android Phone.
2. The Busy Box Library.
3. dSploit Program.
4. ROOT rights.
Instruction manual:
1. Install ROOT rights (I Recommend using KingRoot)
2. Install BusyBox
3. Install dSploit
4. Install the BusyBox library itself
5. If you have a KingRoot program, it can block root for dSploit
So go to KingRoot and remove the ban.
6. Run dSploit and see the following.
All the things I've hidden are my MAC and IP addresses
- All that has a server icon are devices connected to the Wi-Fi network.
- But here it is difficult to determine whose traffic we need to intercept (you can guess), but we use the Network Utilities program (you can also do this in dSploit, but it only detects the operating system).
Remark: since the author is located in Ukraine, to access the FB, he has to open a VPN, which in turn does not allow him to intercept the session. So the rest of the story will be based on the example of TELEGRAM.
(everything is the same as with Facebook, really no differences).
Telegram Account.
Victim logs in to Telegram.
At this time, we choose the victim.
Next, select MITM.
Next Session Hijacker.
Then click Start and intercept the session.
Voila!
These actions can be repeated with almost any site, thereby gaining access to many accounts, since sessions can be stored and used later.