LinuxPenetration Testing

Xerosploit – MITM Framework Tool Install

Medium Medium Attack (MITM) is an attack in which an attacker secretly transmits and may alter communication between two groups that believe they are communicating directly. There are many open tools available online for this attack like Ettercap, MITMF, Xerosploit, e.t.c

Networking is an important testing platform for Ethical Hacker, most of the threat may come from an internal network such as network sniffing, Arp Spoofing, MITM etc. , password theft etc.

Also Read: What Is The Surface Web, Deep Web & Dark Web?

Requirement Package


  • nmap
  • hping3
  • build-essential
  • ruby-dev
  • libpcap-dev
  • libgmp3-dev
  • tabulate
  • terminal tables


Features –

  • Port scanning
  • Network mapping
  • Dos attack
  • Html code injection
  • Javascript code injection
  • Download interception and replacement
  • Sniffing
  • DNS spoofing
  • Background audio reproduction
  • Images replacement
  • Drifnet
  • Webpage defacement and more 


Tested on
Operating system Version 
Ubuntu 16.04 / 15.10 
Kali linux Rolling / Sana
Parrot OS 3.1 


Also Read: What Is The Surface Web, Deep Web & Dark Web?

💥 Xerosploit Installation 💥

Xerosploit is an attack tool for MITM which can run only on Linux OS to do so follow the simple steps:-

Open up terminal and type: 

git clone

cd xerosploit


It will ask you to select your application, here we press 1 Kali Linux.

This will show your network configuration including IP address, MAC address, gateway, interface and hostname. Now use the following command on the xerosploit console to know the first commands:





In this grid, we have a list of our attack commands and we will go to the person who is attacked in the middle, so I will select a scan command in my next step to scan the entire network.

scan :

This command will scan the entire network and you will find all the devices in your network.


As you can see it scans all active festivals. There are too many managers in this network; you must select your target from the given result. I will select for the man in the middle attack.


In the next comment, it will ask for the module you want to load the man into a moderate attack. Go through this comment and type help.





💥 Xerosploit MITM Using 💥


Open This Post and How to Using This Tool 👇


Also Read : Xerosploit – Man in The Middle Attack Tool Full Using Tutorial 














Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button