Home Sniffing & Spoofing Man in the Middle Attack with “Cain and Abel” Tool
CSN

Man in the Middle Attack with “Cain and Abel” Tool

In this tutorial, we will use Cain and Abel to perform this attack. Active eavesdropping alters the communication between two parties who believe they are directly communicating with each other.

A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else.

Man in the Middle Attack on Windows with Cain and Abel

How does It work?

  • The address resolution protocol better known as ARP spoofing allows computers to map Mac addresses to IP addresses.
  • We have to remember computers only care about the Mac address, which is the actual hardware address of the network it’s after; the IP address is just there for human benefit.
  • This system allows the computer to know to who it’s supposed to be sending packets when an IP address is specified.
  • The man-in-the-middle attack works by tricking ARP or just abusing ARP into updating its mappings and adding our attacker machine’s Mac address as the corresponding Mac address for any communication task we wish to be in the middle of.
  • Now that we understand what we’re gonna be doing, let’s go ahead and do it.

Also read MITM attack over HTTPS connection with SSLStrip

Activate the Sniffer – Cain and Abel

Let me activate the sniffer at first so that my network adapter discovers local area network IP addresses.

Man in the Middle Attack on Windows with Cain and Abel

Scanning Network:

Scan for a list of IP addresses so that we can target the victim traffic

Man in the Middle Attack on Windows with Cain and Abel

After adding a range of IPs to scan, Select All hosts in my Subnet

Man in the Middle Attack on Windows with Cain and Abel
Also Read Lyft and Ford team bonded up for building a self-drive car

Address Resolution Protocol Poisoning

Man in the Middle Attack on Windows with Cain and Abel
Man in the Middle Attack on Windows with Cain and Abel

Select the victim’s Ip and default gateway so that we can send the arp request.

Start Arp Poisoning:

Lets poison the victim’s network

Man in the Middle Attack on Windows with Cain and Abel

Also read Driftnet – A tool used to capture images that your friend looking at Online

Victims Traffic Captured

Now the attacker has successfully poisoned the victim, as the result below shows the arrow is the victim’s destination IP, Attacker can resolve this ip and view the website the victim has visited.

Man in the Middle Attack on Windows with Cain and Abel

Also read

URLSnarf – A tool used to capture website links that your friend looking for Online

500 Million UC Browser Android Users are Vulnerable to Man-in-the-Middle Attacks

Bypassing and Disabling SSL Pinning on Android to Perform Man-in-the-Middle Attack

Disclaimer

This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and www.gbhackers.com will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

LEAVE A REPLY

Please enter your comment!
Please enter your name here