In this tutorial, we will use Cain and Abel to perform this attack. Active eavesdropping alters the communication between two parties who believe they are directly communicating with each other.
A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else.
How does It work?
- The address resolution protocol better known as ARP spoofing allows computers to map Mac addresses to IP addresses.
- We have to remember computers only care about the Mac address, which is the actual hardware address of the network it’s after; the IP address is just there for human benefit.
- This system allows the computer to know to who it’s supposed to be sending packets when an IP address is specified.
- The man-in-the-middle attack works by tricking ARP or just abusing ARP into updating its mappings and adding our attacker machine’s Mac address as the corresponding Mac address for any communication task we wish to be in the middle of.
- Now that we understand what we’re gonna be doing, let’s go ahead and do it.
Also read MITM attack over HTTPS connection with SSLStrip
Activate the Sniffer – Cain and Abel
Let me activate the sniffer at first so that my network adapter discovers local area network IP addresses.
Scanning Network:
Scan for a list of IP addresses so that we can target the victim traffic
After adding a range of IPs to scan, Select All hosts in my Subnet
Also Read Lyft and Ford team bonded up for building a self-drive car
Address Resolution Protocol Poisoning
Select the victim’s Ip and default gateway so that we can send the arp request.
Start Arp Poisoning:
Lets poison the victim’s network
Also read Driftnet – A tool used to capture images that your friend looking at Online
Victims Traffic Captured
Now the attacker has successfully poisoned the victim, as the result below shows the arrow is the victim’s destination IP, Attacker can resolve this ip and view the website the victim has visited.
Also read
URLSnarf – A tool used to capture website links that your friend looking for Online
500 Million UC Browser Android Users are Vulnerable to Man-in-the-Middle Attacks
Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack
Disclaimer
This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and www.gbhackers.com will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.