Sunday, May 28, 2017

Man In The Middle Attack Using Ettercap In Kali Linux

Man In The Middle Attack Using Ettercap In Kali Linux


Man In The Middle Attack - Ettercap - Kali Linux - picateshackz.com

It’s one of the simplest but also most essential steps to “Conquering” a network. Once a hacker has performed a “Man In The Middle” attack (MITM) on a local network, he is able to perform a number of other “Side-kick” attacks. This includes: cutting a victim’s internet connection; intercepting Emails, logins, and chat messages; and many others. here we are using one of the best tool Ettercap.


Ettercap

Ettercap has a huge following and is widely used by cybersecurity professionals. Ettercap works by placing the users network interface into promiscuous mode and by ARP poisoning the target machines, i.e. facilitating a Main In The Middle or MITM attack. Once successfull Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its ability to support various plugins.

And only one tool is needed for this attack:

  • An install or Live boot of Kali Linux, a well-known OS containing a collection of hundreds of penetration testing tools - Click here to install Kali linux

If you have that, then proceed to the tutorial below, and we’ll demonstrate how to perform this powerful attack.


NoteThis tutorial is intended to be used for penetration testing, i.e. the act of hacking to become more secure. It is not at all meant for malicious purposes. Performing any type of fraudulent activity on someone else’s network without permission is considered a crime in most countries. PicaTesHackZ is using their own test network in this demonstration.


Step One:

Start Kali Linux and login to the root user.


Step Two:

Open a Terminal and type: leafpad /etc/ettercap/etter.conf


Step Three:

Look through the text file that just opened. On one of the first lines, under the [privs] section, look for the words highlighted below:


You need to change these lines to this:


By removing the number 65534 and replacing it with 0 (zero). You can leave the “# nobody is default” line.


Step Four:

This next one will be tricky to locate, so we’re going to use the “Find” option. Click onSearch in the toolbar at the top of leafpad and click Find.
Type the word iptables in the box that appears and click the Find button or press Enter.


It should skip to a line that looks like this:


We need to “uncomment” the two bottom lines. To do this, remove the two “#” symbols before each “redir_command,” so that the two lines look like this:


Now close leafpad and click Yes when it asks you to save changes.


Step Five:

Now start Ettercap-gtk, open a Terminal and type ettercap –G


Wait until Ettercap opens. When it does, click Sniff in the toolbar and select Unified Sniffing… from the menu.



Step Six:

Select the interface that’s connected to the network.


If your using a wired (ethernet) connection, then the interface will probably be eth0, but if you’re using wireless, (WLAN), then it will be a different one. To find which one of your interfaces is connected, run ifconfig.


Step Seven:

Now Ettercap should load into attack mode. Click on Hosts and select Scan for hostsfrom the menu.



Step Eight:

Ettercap will briefly scan for hosts on the network. After a moment, you should see the words “hosts added to the host list…” in the command box. This is the green light.
Click on Hosts again, and this time select Hosts list from the menu.



Step Nine:

Click the IP address of the router and click the Add to Target 1 button.


Then select the IP of your test victim’s machine and click Add to Target 2.



Step 10:

Now click Mitm on the toolbar and select Arp poisoning…


When the question box shows up, check the box next to Sniff remote connections and hit OK.



Step 11:

Ettercap will now Arp poison the victim and router. Now if you want to see any of the victim’s personal info, you’ll need to click Start on the toolbar and select Start sniffing.