Tutorials

73 Hacking Tools in one Hacking Tool – Step By Step

Introduction

We always prefer Operating system which has all penetration testing tools bundled in one. HackingTool is one of that kind, its an open-source framework and we use this for penetration testing. This tool has 73 hacking tools of different range. In this framework, we have all the tools in one place, which the penetration tester needs while testing. Researcher of International Institute of Cyber Security also agrees, that it is easier for hackers/penetration tester while testing/hacking any device or a network. During this post we will demonstrate step by step process on the usage of this tool.

Environment

  • Os: Kali Linux 2020 64 bit
  • Kernel version: 5.6.0

Installation Steps

[email protected]:/home/iicybersecurity# git clone https://github.com/Z4nzu/hackingtool
Cloning into 'hackingtool'...
remote: Enumerating objects: 24, done.
remote: Counting objects: 100% (24/24), done.
remote: Compressing objects: 100% (23/23), done.
remote: Total 174 (delta 9), reused 0 (delta 0), pack-reused 150
Receiving objects: 100% (174/174), 666.21 KiB | 853.00 KiB/s, done.
Resolving deltas: 100% (91/91), done.
  • Use this command to provide file permissions and enter into the directory.
  • chmod -R 755 hackingtool && cd hackingtool
[email protected]:/home/iicybersecurity# chmod -R 755 hackingtool && cd hackingtool
[email protected]:/home/iicybersecurity/hackingtool#
  • Next, use this command to install the requirements sudo pip3 install -r requirement.txt
[email protected]:/home/iicybersecurity/hackingtool# sudo pip3 install -r requirement.txt
Requirement already satisfied: lolcat in /usr/local/lib/python3.8/dist-packages (from -r requirement.txt (line 1)) (1.4)
Requirement already satisfied: boxes in /usr/local/lib/python3.8/dist-packages (from -r requirement.txt (line 2)) (0.0.0)
Requirement already satisfied: flask in /usr/lib/python3/dist-packages (from -r requirement.txt (line 3)) (1.1.2)
Requirement already satisfied: requests in /usr/lib/python3/dist-packages (from -r requirement.txt (line 4)) (2.23.0)
  • Now, use this command to launch the tool. python3 hackingtool.py
Hacking Tool – Tool Launch
  • Successfully launched the tool.
  • Here, we see 15 different modules.
  • Detailed below are different modules:

AnonSurf

What is Anonmously surf

Anonymously surf is a place where we can hide by changing our location. Here we are using the Anonsurf tool, this tool sets iptables settings to set transparent proxy via TOR network. This anonsurf tool sends all our outgoing traffic through the TOR network, so by using this we can be safe while browsing the internet.

  • Here, choose 00 AnonSurf.
Hacking Tool – Anonmously Hiding Tool
  • Now, choose option 1 for Anonmously surf. Before launching this tool, we have to download the tool by choosing option 1.
sh: 2: boxes: not found
sh: 1: echo: echo: I/O error
[1]install [2]Run [3]Stop [99]Main Menu >> 1
Cloning into 'kali-anonsurf'...
remote: Enumerating objects: 321, done.
remote: Total 321 (delta 0), reused 0 (delta 0), pack-reused 321
Receiving objects: 100% (321/321), 167.72 KiB | 377.00 KiB/s, done.
Resolving deltas: 100% (99/99), done.
--2020-07-06 10:36:14--  https://geti2p.net/_static/i2p-debian-repo.key.asc
Resolving geti2p.net (geti2p.net)... 91.143.92.136, 2a02:180:a:65:2456:6542:1101:1010
Connecting to geti2p.net (geti2p.net)|91.143.92.136|:443... connected.
HTTP request sent, awaiting response... 200 OK
=============================================================================================================SNIP==============================================================================================================================
Processing triggers for systemd (245.6-1) ...
Processing triggers for man-db (2.9.3-1) ...
Processing triggers for kali-menu (2020.3.1) ...
dpkg-deb: building package 'kali-anonsurf' in 'kali-anonsurf.deb'.
Selecting previously unselected package kali-anonsurf.
(Reading database ... 525307 files and directories currently installed.)
Preparing to unpack kali-anonsurf.deb ...
Unpacking kali-anonsurf (1.2.2.2) ...
Setting up kali-anonsurf (1.2.2.2) ...
Processing triggers for systemd (245.6-1) ...
Processing triggers for kali-menu (2020.3.1) ...
  • Now, choose option 1 to select anonsurf tool and choose option 2 to run the tool.
sh: 2: boxes: not found
sh: 1: echo: echo: I/O error
[1]install [2]Run [3]Stop [99]Main Menu >> 2
 * killing dangerous applications
 * cleaning some dangerous cache elements
[ i ] Stopping IPv6 services:
 
 
[ i ] Starting anonymous mode:
 
 * Modified resolv.conf to use Tor and Private Internet Access DNS
 * All traffic was redirected through Tor
 
[ i ] You are under AnonSurf tunnel
  • Here, we have successfully started the tor network.
  • Now, type ifconfig.me in browser to verify our IP.
Hacking Tool – Ifconfig.me
  • Successfully we have changed the location.

Information Gathering

What is information gathering?

Information Gathering is collecting some unique information about the target it can be active or passive. 

  • Now, choose option 1 to use information gathering.
Hacking Tool – Information Gathering
  • Successfully launched the information gathering module.
  • Now, choose option 5 to use “Xerosplit” tool.
Hacking Tool – Information Gathering – Xerosploit Installer
  • Before running the tool, we have to install the tool by selecting option 1 Install.
  • It automatically clone the file and we have to choose the operating system, depending on this it will download the requirements.
[++] Installing Xerosploit ...
Hit:1 http://deb.i2p2.no unstable InRelease
Hit:2 http://mirror.neostrada.nl/kali kali-rolling InRelease
Reading package lists... Done
Reading package lists... Done
Building dependency tree
Reading state information... Done
build-essential is already the newest version (12.8).
build-essential set to manually installed.
git is already the newest version (1:2.27.0-1).
=================================================================================================================SNIP========================================================================================================================
Installing ri documentation for network_interface-0.0.2
Parsing documentation for pcaprub-0.13.0
Installing ri documentation for pcaprub-0.13.0
Parsing documentation for packetfu-1.1.13
Installing ri documentation for packetfu-1.1.13
Parsing documentation for xettercap-1.5.7xerob
Installing ri documentation for xettercap-1.5.7xerob
Done installing documentation for em-proxy, net-dns, network_interface, pcaprub, packetfu, xettercap after 7 seconds
6 gems installed
  • Now, choose option 5 for the Xerosploit tool, then choose option 2 to run xerosploit tool.
Hacking Tool – Information Gathering – Xerosploit Fig 1
  • Now, type help to view the options.
Hacking Tool – Information Gathering – Xerosploit Fig 2
  • Here, we have selected “scan” option. This will collect all the IP address and MAC address, which are connected to a LAN (Local Area Network).

Wordlist Generator

Hacking Tool – Wordlist Generator

The Goblin word creator is used to generate the wordlist. This wordlist is useful for password cracking techniques in brute force attacks etc.

  • Now, choose the option 3 to run Goblin wordCreator tool.
sh: 1: boxes: not found
sh: 1: echo: echo: I/O error
[1]Install [2]Run [99]Back >>2
 
------------------
 
 G 0 B L ! N 2.0 | WORDGENERATOR
 
~ by: UndeadSec and Sam Junior:@un00mz
 
------------------
 
[!] provide a size scale [eg: "1 to 8" = 1:8] : 1:3
 
[?] Do you want to enter personal data ? [y/N]: y
 
[*] Fist Name: vemula
 
[*] Last Name: nandu
 
[*] Birthday: 20
 
[*] Month: may
 
[*] Year: 1996
 
[!] Insert a name for your wordlist file: wordlist
 
[?] Do you want to use uppercase characters? (y/n): n
 
[?] Do you want to use special characters? (y/n): n
 
[?] Do you want to use numeric characters? (y/n): y 
  •  First, choose option 1 to install the tool and it’s requirements, then choose option 2 to launch the tool.
  • Here, it asks to use the scale size for wordlist length. Then it will ask to use a few personal details and select the required option. Then the tool starts generating the wordlist.
v
e
Q
p
l
a
=============================================================================================================SNIP===============================================================================================================================
003
004
005
006
007
008
009
000  
  • Successfully we got the list.
  • If you want to generate wordlist offline then you can also use crunch tool.

Wireless Attack

What is Wireless Attack

The wireless attack can be of many types. Example like Man In The Middle Attack, DOS attack.

  • In this module we have 7 different tools.
  • WIFI – Pumpkin: WIFI – Pumpkin help hacker to create open-source fake wifi. If any victim connect to that wifi, we will be able to track his/her activities
  • Pixiewps: Pixiewps tool is used brute force the WPS pin in offline. This tool is built-in C language.
  • Fluxion: Fluxion is a wifi hacking tool. This tool doesn’t need any wordlist to crack the password. Using this tool we can hack two different ways manually reveal the hidden WIFI access and how to access hidden wifi.
  • WIFITE: WIFITE is used to attack the WIFI to steal the credentials for this, this performs a dictionary attack with a high number of wordlist for this we need a wireless adapter.
  • EvilTwin: EvilTwin is a hacking tool, using this tool hacker setups a fake WIFI network. If the victim connects to this wifi network, so it will be easy to steal the victim’s login credentials or other sensitive information.

if you want to learn all the tools then you can refer to the ethical hacking course offered by International Institute of Cyber Security.

SQL Injection tools

What is SQLMap

SQLMap is an automatic SQL injection tool. We can use this tool to find out SQLi vulnerabilities on a webpage and stealing the confidential data from the database server. This is an open-source and penetration testing tool.

Phishing Attack Tools

The main aim of Phishing Attack is to steal the victim’s credentials by creating the fake phishing page.  

Hacking Tool – Phishing Attack Tools
  • Setoolkit: Setoolkit is also called a social engineering tool kit. We can use this social engineering tool to create the fake webpage to the victim to steal the victim’s credentials and we can also create the different payload to bypass the victim’s machine.
  • SocialFish: SocialFish is used for a phishing attack. Using this tool, we can create phishing pages to steal the victim’s credentials and collecting those credentials using traffic collector servers.
  • Shellfish: ShellFish is used for phishing attacks. Using this tool, we can create 18 popular phishing pages to steal the victim’s credentials and most of the social media phishing pages are available in this tool.
  • BlackEye: BlackEye is used for phishing attacks. Using this tool, we can create 32 popular phishing pages to steal the victim’s credentials and most of the social media phishing pages are available in this tool.
  • I See You: I See You is used for a phishing attack. Using this tool we can get the victim’s location details.
  • Say cheese: Say cheese is used for phishing attacks. This tool creates a malicious link, if the victim opens this link it starts taking the webcam shots and sends back to the hacker’s machine using port forwarding techniques.
  • QR code Jacking: QR code jacking is used for phishing attacks. This tool creates a malicious QR code, if the victim scan this malicious QR code with his account, the same hacker will able to access the victim’s account.

Web Hacking

What is Web Hacking

Web hacking is exploiting the websites by collecting information, scanning the websites with different tools, finding out the vulnerabilities, exploiting the website and stealing the visitor’s information, spreading viruses, etc.

  • In the web attack module, we have 5 different tools.
    • Web2Attack
    • Skipfish
    • SubDomain Finder
    • CheckURL
    • Blazy (Also Find ClickJacking)
  • In the web attack module, we have 5 different tools.

Blazy

Blazy is another brute-force tool and very good error detecting tool, using this tool we can find out the CSRF (Cross-Site Request Forgery), Clickjacking, Cloudflare. This tool has a default username and password.txt file or we can also create our own username and password list file.

  • Before launching the tool, we have installed this by choosing option 1. This will install the file and follow the same steps then chose option 2 to launch the tool.
Hacking Tool – Web Attack Tools
  • Here, we have entered the target URL hackthissite.org. This tool scanned and found CSRF Vulnerability in this website.

Post exploitation

What is Post Exploitation?

We use the post-exploitation module after compromising the machine. In this process, the hacker’s aim is to collect the victim’s sensitive data.

  • In post exploitation we have 2 different tool
    • Vegile – Ghost in the shell
    • Chrome Key logger

Forensics tools

The computer forensics tools are used to check the operating system after post exploitation in system or network.

  • In the forensic module, we have 5 different tools
    • Autopsy
    • Wireshark
    • Bulk_extractor
    • Disk Clone and ISO Image Acquire
    • Toolsley

Payloads

What is Payloads

The payloads is a simple scripts/malicious content file used by hackers to exploit any victims machine by simply executing this payload on the victims machine.

  • In this module we have 6 different payloads
    • The FatRat
    • Brutal
    • Stitch
    • MSFVenom Payload Creator
    • Venom Shellcode Generator
    • Spycam

Router Exploit

Router Exploit is an open-source and powerful hacking tool. Using this tool, we can find the vulnerabilities in routers, Cameras, etc

  • In this module, we have 2 different tools
    • RouterSploit
    • Fastssh

wifi-jammer

What is wifi-jammer?

WiFi-jammer is a powerful hacking tool, using this tool we can restrict any user while connect connecting to the wifi.

  • In this module we have one tool
    • Using Airmon

SocialMedia Finder

What is SocialMedia Finder

Social Media Finder is same like information gathering. In this we investigate different social media profile by using they usernames and they photos.

  • In this module we have two different tools.
    • Find SocialMedia By Facial Recognition System
    • Find SocialMedia By UserName

Steganography

Steganography is the best tool for hiding any type of file like Images, confidential information, file, etc.

  • In this module, we have 3 different tools.
    • SteganoHide
    • StegnoCracker
    • WhiteSpace

Conclusion

We saw all the penetration testing tool bundled in HackingTool which can be used to perform penetration testing. Most of the tools are widely used in a real-time environment. Using this tool, it makes easier for penetration tester to do his/her job.

To Top

Pin It on Pinterest

Share This