Description: Official Website: https://github.com/DanMcInerney/LANs.py
Download:
git clone https://github.com/DanMcInerney/LANs.py.git
cd LANs.py/
Install:
Open a Terminal and type:
git clone https://github.com/DanMcInerney/LANs.py.git
------
Then type:
cd LANs.py
-----
Type in a Terminal:
python LANs.py -u -n
-u: print URLs the victim visits (minus output spamming image and css URLs)
-n: perform a fast port scan of the target
python LANs.py -u -p
-u: print URLs visited
-p: print usernames, passwords, messages, and searches made
and you can now see packet loads they send to other servers, HTTP/IRC/IMAP/POP/FTP username/passwords along with incoming/outgoing email and IRC messages, and any search they make on any nonSSL site.
It'll even decode base64 encrypted IMAP/POP authentications if their email server encrypts them that way.
For more commands check out:
https://github.com/DanMcInerney/LANs.py
My websites:
http://zarabyte.com
http://matthewhknight.com
http://twitter.com/ZaraByte
http://facebook.com/ZaraByte
Tags: Using LANs.py , mitm attack , arpspoof , zarabyte , phiberoptics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.