Perform Advanced Man-in-the-Middle Attacks with Xerosploit

A hacker who infiltrates a network and forces all nearby devices to connect directly to their machine is committing a man-in-the-middle attack, or MitM attack. They can use this to monitor traffic and even change some things. One tool that can be used for these MitM attacks is Bettercap, but Xerosploit can automate high-level operations that Bettercap would typically require more configuration for.

Bettercap and Nmap are two additional tools that Xerosploit sits on top of, automating them to the point where you can complete these higher-level tasks with just a few commands.

Don’t be surprised if some websites can’t be spoofed because the target is using HTTPS or routing traffic through a VPN; Xerosploit can be hit or miss in this regard. Given that 73% of websites are HTTPS, only 27% of them can be successfully manipulated, and only if no VPN is being used.

Because they don’t switch over to HTTPS from HTTP, some websites can still be accessed via HTTP, and some don’t even have secure versions yet. There are many more in that 27%, though this is only a small sample:

What’s Needed

Only Ubuntu and Kali Linux have we tested Xerosploit on, but macOS may also be compatible. However, during the installation process, you can only choose between “Parrot OS” and “Ubuntu / Kali Linux / Others.”