githubEdit

ARP Poisoning

ARP Poisoning

Tools: Bettercap, PCredz, pywsus

Link: https://github.com/lgandx/PCredz and https://github.com/GoSecure/pywsus

Use cases

Dump Network Secrets

1) Create/modify config file

Bettercap config file

quick recon of the network

net.probe on

set the ARP poisoning

set arp.spoof.targets <target_IP>
set arp.spoof.internal true
set arp.spoof.fullduplex true

control logging and verbosity

start the modules

2) Run bettercap

3) Then sniff with Wireshark. When it is finish, save the trace in a .pcap file and extract the secrets:

SMB Spoofing

1) Start the SMB server for capture or relay then start the poisoning attack.

quick recon of the network

set the ARP spoofing

reroute traffic aimed at the original SMB server

control logging and verbosity

start the modules

2) Run bettercap OR responder

DNS Spoofing

1) Start the DNS server (responder, dnschef, or bettercap) for DNS poisoning then start the ARP poisoning attack.

quick recon of the network

set the ARP spoofing

reroute traffic aimed at the original DNS server

control logging and verbosity

start the modules

2) Run bettercap OR responder OR DNSChef

WSUS Spoofing (Windows Server Update Services)

ARP poisoning for WSUS spoofing in a two-subnets layout (attacker + client in the same segment, legitimate WSUS server in another one). Packets from the client to the WSUS server need to be hijacked and sent to the attacker's evil WSUS server. In order to do so, the attacker must pose as the client's gateway, route all traffic to the real gateway except the packets destined to the WSUS server.

1) The evil WSUS server needs to be started before doing ARP poisoning. The pywsus (Python) utility can be used for that matter.

2) Once the WSUS server is up and running, the ARP poisoning attack can start.

quick recon of the network

set the ARP spoofing

reroute traffic aimed at the WSUS server

control logging and verbosity

start the modules

3) The caplet above can be loaded with the following command in order to launch the ARP poisoning attack.

4) The search for Windows updates can be manually triggered when having access to the target computer by going to

Last updated