SUP, My fellow hackers!
This time I am doing a tutorial on a tool called TRAPE, it can track and do things in the victim's device.
No more boring thing like the previous tutorials like mass mail and john the ripper....
What you would need is Kali Linux, a linux made for hacking, if you are new then I really advice this.
I did a tutorial on TrackURL which tracks people, but this one is better, you can send messages to the victim, download a file to the device, show which website it went in to, constantly tracking, and we can do more.
If you are interested in TrackURL, click this link.
Enough talking, lets get right into the tutorial.
Clone It!
Yes, you know me, I start with cloning since programs inside Kali is limited.
So to clone it, type in the terminal :
git clone https://github.com/boxug/trape.git
And, it will do stuffs.
Now, lets get permission into it by :
chmod -R 755 Trape
Then, get in the file by : "cd Trape".
Lets see what is inside that folder. type : "ls"
Oh, we have some stuffs!
You have the same thing? Lets keep going.
Installing the Requirements
Before executing to script, we first have to install some specific requirements.
To install them, simply type :
pip install -r requirements.txt
If you don't have the requirements, then it will automatically get the requirements, and if you already have them installed like me, then there is nothing to worry about.
Launching Script & Control Pannel
Unlike the other scripts like Metasploit, Trape is controllable on the web.
(It's beginner friendly!)
But first, execute the script.
You can execute the script by :
python trape.py -u URL -p PORT
Don't type it exact as mine.
In the URL, you have to put the url that you want to clone.
(So if I put https://www.youtube.com int the URL,then the phishing web will look like YouTube)
In the PORT, put your port.
I did it like this.
Click enter, then it will show 3 things :
The link to lure the victims, The control panel link, and the access key to it.
If you think that the victims will think suspicious, then you can shorten the link using bit.ly, ad.fly, all those things.
Now, copy and paste the Control Panel link on the web.
And put the access key it gave you in the terminal.
Let me just copy and paste that.
And send the link to the victim.
Takes a bit of social engineering, I sent it to my brother
(He completely doesn't know about this he is in the living room watching movies right now)
Ah-ha!!!! Got him!
You could have just sent a real meme site to make it look real, but I just said that I trolled him.
And haha his profile pic is the skeleton from TrackURL(We have the same icloud account so....)
He went in, so we can see everything.
Oh yeah, forgot to mention that it be used to a lot of victims.
Lets see what he is up to.
Don't think it's rubbish, my art is gorgeous(For some privacy reason)
In the Attacks Hook button next to the Information, you can download files and send messages and do stuff!
If you want to hack the victim's device perfectly, you can make a website and make the victim redirect to your website, you can just let the victim download a payload made by Metasploit and take control completely!(There is a button for these)
Sorry, I can't show you those because I forgot to take snaps of those attacks (and I am lazy)
Did It Work?
Please comment down below for where to improve, and some suggestions to what I can do next!
If you need help, comment, I will try my best to help you!
Comments
No Comments Exist
Be the first, drop a comment!