Sunday, May 28, 2017
Man In The Middle Attack Using Ettercap In Kali Linux
Man In The Middle Attack Using Ettercap In Kali Linux
Its one of the simplest but also most essential steps to Conquering a network. Once a hacker has performed a Man In The Middle attack (MITM) on a local network, he is able to perform a number of other Side-kick attacks. This includes: cutting a victims internet connection; intercepting Emails, logins, and chat messages; and many others. here we are using one of the best tool Ettercap.
Ettercap
Ettercap has a huge following and is widely used by cybersecurity professionals. Ettercap works by placing the users network interface into promiscuous mode and by ARP poisoning the target machines, i.e. facilitating a Main In The Middle or MITM attack. Once successfull Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its ability to support various plugins.
And only one tool is needed for this attack:
- An install or Live boot of Kali Linux, a well-known OS containing a collection of hundreds of penetration testing tools - Click here to install Kali linux
If you have that, then proceed to the tutorial below, and well demonstrate how to perform this powerful attack.
Note: This tutorial is intended to be used for penetration testing, i.e. the act of hacking to become more secure. It is not at all meant for malicious purposes. Performing any type of fraudulent activity on someone elses network without permission is considered a crime in most countries. PicaTesHackZ is using their own test network in this demonstration.
Step One:
Start Kali Linux and login to the root user.
Step Two:
Open a Terminal and type: leafpad /etc/ettercap/etter.conf
Step Three:
Look through the text file that just opened. On one of the first lines, under the [privs] section, look for the words highlighted below:
You need to change these lines to this:
By removing the number 65534 and replacing it with 0 (zero). You can leave the # nobody is default line.
Step Four:
This next one will be tricky to locate, so were going to use the Find option. Click onSearch in the toolbar at the top of leafpad and click Find.
Type the word iptables in the box that appears and click the Find button or press Enter.
It should skip to a line that looks like this:
We need to uncomment the two bottom lines. To do this, remove the two # symbols before each redir_command, so that the two lines look like this:
Now close leafpad and click Yes when it asks you to save changes.
Step Five:
Now start Ettercap-gtk, open a Terminal and type ettercap G
Wait until Ettercap opens. When it does, click Sniff in the toolbar and select Unified Sniffing
from the menu.
Step Six:
Select the interface thats connected to the network.
If your using a wired (ethernet) connection, then the interface will probably be eth0, but if youre using wireless, (WLAN), then it will be a different one. To find which one of your interfaces is connected, run ifconfig.
Step Seven:
Now Ettercap should load into attack mode. Click on Hosts and select Scan for hostsfrom the menu.
Step Eight:
Ettercap will briefly scan for hosts on the network. After a moment, you should see the words hosts added to the host list
in the command box. This is the green light.
Click on Hosts again, and this time select Hosts list from the menu.
Step Nine:
Click the IP address of the router and click the Add to Target 1 button.
Then select the IP of your test victims machine and click Add to Target 2.
Step 10:
Now click Mitm on the toolbar and select Arp poisoning
When the question box shows up, check the box next to Sniff remote connections and hit OK.
Step 11:
Ettercap will now Arp poison the victim and router. Now if you want to see any of the victims personal info, youll need to click Start on the toolbar and select Start sniffing.