Tangalanga – The Zoom Conference Scanner Hacking Tool

Tangalanga - The Zoom Conference Scanner Hacking Tool

After covid19 is become a pandemi and spread arround the world, many countries make a decision to do social distancing. Because of that many people can’t talk face to face including workers, student and more. And the ways he can talk with each other is teleconfece or video call. Later, Zoom is one of most popular teleconference apps that used by people. And it also become an hackers object to find some vulnerabilites. And of course, hackers get some security issues on Zoom, so they can remote your computer or spying a conference on Zoom. Click here to see the details.


Zoom Conference scanner.

This scanner will check for a random meeting id and return information if available.


First try to see if there’s any prebaked version for the date: https://github.com/elcuervo/tangalanga/releases.

This versions already have a token ready to use.

Either way you can find the Windows, Linux and Mac version on Releases https://github.com/elcuervo/tangalanga/releases.

Download, uncompress and enjoy.


This are all the possible flags:

tangalanga \
    -token=user-token \   # [default: env TOKEN]  user token to use.
    -colors=false \       # [default: true]    enable/disable colors
    -censor=true \        # [default: false]   censors output
    -output=history \     # [default: stdout]  write found meetings to file
    -debug=true \         # [default: false]   show all the attmpts
    -tor=true \           # [default: false]   enable tor connection (will use default socks proxy)
    -hidden=true \        # [default: false]   enable embedded tor connection (only linux)
    -rate=7 \             # [default: ncpu]    overwrite the default worker pool
    -proxy=socks5://... \ # [default: socks5://]   proxy url to use


Unfortunately I couldn’t find the way the tokens are being generated but the core concept is that the zpk cookie key is being sent during a Join will be usable for ~24 hours before expiring. This makes trivial to join several known meetings, gether some tokens and then use them for the scans.

Tokens can be sniffed after a join attempt to a meeting. This means that to “fish” a token you’ll need a setup that can sniff traffic and also spoof certificates.

Using Wireshark, Charles or any other of the ssl-proxying-capable tools out there will do the trick.

TOR (only linux)

Tangalanga has a tor runtime embedded so it can connect to the onion network and run the queries there instead of exposing your own ip.

Tangalanga - The Zoom Conference Scanner Hacking Tool with TOR network

For any other system I recommend a VPN

Why the bizarre name?

This makes reference to a famous 80s/90s personality in the Rio de la Plata. Doctor Tangalanga who loved to do phone pranks.

You May Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *

20 − 11 =