Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Sniff build UFR Stealer


steambag

Recommended Posts

We will catch the gate/ftp/email, which set the existing build stealer.

 

We need:

- Build stealer

- Wireshark

- VirtualBox

 

1. The first thing to do - kill all of the processes that use the network. So it will be easier to find the data you need.

2. Run Wireshark and configure the interface for sniffing: Capture -> Interfaces. Choose the one that you used - in the column will be the largest number of Packets. Click "Start", thereby starting sniffing.

3. Run the build stealer (all on VirtualBox, and nothing else!) and control Process Explorer his work forward to the completion.

4. Go to Wireshark and click Capture -> Stop, that is complete sniffing. We now have a dump of the network activity of the entire system for while working build stealer. It remains to find the desired data.

 

FTP:

To start trying to detect FTP-server, suddenly stealer in this way sends a report with passwords.

We go to the Wireshark and type into the filter field word "ftp" and press "Enter":

 

This is the hidden content, please

 

We received the packages sent by FTP:

 

This is the hidden content, please

(In the picture selected host, username and password of FTP)

 

Gate:

Try to catch the gate address. Remove the "ftp" from the line filter and look for the package follows stealer. Hit Ctrl + F to open the search window. Choosing a search string (Find by: String) and type into the search string "UFR", leave the rest on the default. If the build is to send the password to the gate, something had to be found.

 

This is the hidden content, please

 

Email:

To do this in the filter field, trying to type the string "smtp" and see this:

 

This is the hidden content, please

 

Decode username and password from soap sender using this

This is the hidden content, please

Go to the email and change the password.

Edited by steambag
Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.