NetRipper – this is a fairly recent tool that is positioned for the post-operating system based on Windows and uses a number of non-standard approaches to extract sensitive data. It uses API hooking in order to intercept network traffic and encryption related functions from a low privileged user, being able to capture both plain-text traffic and encrypted traffic before encryption/after decryption. This tool was first demonstrated at the Defcon 23 in Vegas.
- Added support for Opera and SecureCRT
- Added support for Slack x64
- Added support for Chrome 70 x64
Installing NetRipper in Kali Linux
How to use NetRipper
Generating FUD payload with Shellter
- Download and run shellter
- Choose Operation Mode and Target [executable file to embed backdoor], on this tutorial, I am going to use plink.exe file
- Configure your payload, setting LHOST, RPORT parameter
- Start Metasploit listener
- Send backdoored-file to your victim and wait until it starts
- You /post/windows/gather/netripper module, and setting the parameter. I am going to inject firefox.exe process. You can also inject Google Chrome process.
- And now all the data from these processes are beginning to be saved in the temporary directory of the user.
- Now, you can get all victim traffic (include HTTPS traffic)
Copyright (C) NytroRST