Skip to content

Latest commit

 

History

History
125 lines (83 loc) · 5.16 KB

README.md

File metadata and controls

125 lines (83 loc) · 5.16 KB

Bazinga

Bazinga is a lightweight tool (only 2 extra npm packages ngrok and yargs required) written in Node.js that can be used for info gathering and credentials harvesting via social engineering. It can also be used to redirect multiple users to multiple websites or to serve different websites to different users. This is done via tokens embedded in the URL. This tool can:

  • Gather the usual info about an IP like Geolocation and all.
  • Gather juicy info about an IP like movies, games, software, etc downloaded via torrent.
  • Redirect the user to a website.
  • Be used for credentials harvesting via phishing pages.
  • Serve different sites to the different users based on tokens.

Screenshots

Screenshot

Screenshot

Installation

Bazinga requires nodejs basic packages and external packages like ngrok and yargs to run. To install this tool in Ubuntu, run the following commands:

git clone https://github.com/vikas-kundu/bazinga.git
cd bazinga
sudo chmod +x install.sh
sudo ./install.sh

This will install nodejs and the necessary packages for you. Now for it to function fully, you also need an API key from clicking here.

screenshot This key is necessary if you wish to perform info gathering. Else for only credentials harvesting, no need for the key. Finally, save the key in the bazinga/config/options.js file and you are good to go.

screenshot

Usage

For help info run:

node bz -h

Usage Examples:

node bz --generator=1 --mode=info --token-len=32 --port 8080
node bz --generator=2 --mode=phish --local-url=/sites/github/index.html
node bz --generator 3 --mode info --redirect-url 'https://www.reddit.com'
node bz --generator 4 --mode info --listener
node bz --listener

Options

-h, --help

Show help
[boolean]

--generator

No. of unique tokens to generate. [number] [default: 0]

--mode

For IP Capture and Info gather: mode=info For Phishing: mode=phish
[string] [default: "info"]

--listener

Start server to capture incoming requests. [boolean] [default: false]

--redirect-url

URL to redirect the victim after capturing IP or saving phishing credentials. [string] [default: "http://www.google.com"]

--local-url

Phishing page to serve the victim. To be used with mode=phish. All those pages are present in the sites folder of bazinga. [string] [default: "./sites/error.html"]

--port

Port address to bind proxy server. [number] [default: 2313]

--token-len

Length of token to be generated. [number] [default: 12]

Working

When the user calls the tool with the --generator parameter, tokens are saved in session.js file. Each token has some distinct properties associated with it i.e. mode, local-url, etc. When the --listener parameter is provided, the tool starts a local HTTP server of node js on a particular port (default or user-provided) and a Ngrok tunnel on the same.

Screenshot

This Ngrok tunnel gives the tool the ability to target users over the internet. When a Ngrok tunnel is obtained, all the tokens are picked from session.js, attached with ngrok tunnel URL, and saved in links.txt file. The contents of links.txt may look something like this:

Screenshot

Thereafter, when you share the links with a victim and the victim opens the link, either the victim is redirected or a phishing page is served. Based on what you saved the token for. For example, a Github login phishing page of the tool looks like this.

screenshot

Notice the ngrok URL in the address bar along with token (?id=). Once the victim enters credentials, the victim is then redirected to a link (default or user-specified). For instance, in this case, google.

google

The tool then informs you that credentials have been captured and outputs the file location where victim credentials are saved.

ss

Finally, if you open the file at that location, credentials will be seen in JSON format like this.

ss

Todos

  • Add more phishing pages.
  • Add a logger and use colors.
  • Create a GUI.

LEGAL DISCLAIMER

This tool is to be used for educational purposes only. Usage of bazinga for attacking targets without prior mutual consent is illegal. It is the end user responsibility to obey all applicable local, state and federal laws. Developers assume no liability for any misuse or damage caused by this program.

License

MIT