Man in the Middle Attack with “Cain and Abel” Tool

0
Man in the Middle Attack on Windows with Cain and Abel

Active eavesdropping alters the communication between two parties who believe they are directly communicating with each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else. In this tutorial, we will use Cain and Abel to perform this attack.

Man in the Middle Attack on Windows with Cain and Abel

How does It work?

  • The address resolution protocol better known as ARP allows computers to map Mac addresses to IP addresses.
  • We have to remember computers only care about the Mac address, which is the actual hardware address of the network it’s after; the IP address is just there for human benefit.
  • This system allows the computer to know who it’s supposed to be sending packets to when an IP address is specified. The man in the middle attack works by tricking ARP or just abusing ARP into updating its mappings and adding our attacker machine’s mac address as the corresponding mac address for any communication task we wish to be in the middle of. Now that we understand what we’re gonna be doing, let’s go ahead and do it.

Also read MITM attack over HTTPS connection with SSLStrip

Activate the Sniffer

Let me activate the sniffer at first so that my network adapter discover local area network IP addresses.

Man in the Middle Attack on Windows with Cain and Abel

Scanning Network:

Scan for list of IP address so that we can target the victim traffic

Man in the Middle Attack on Windows with Cain and Abel

After adding range of IP’s to scan, Select All hosts in my Subnet

Man in the Middle Attack on Windows with Cain and Abel

Address Resolution Protocol Poisoning

Man in the Middle Attack on Windows with Cain and Abel

Man in the Middle Attack on Windows with Cain and Abel

Select victims Ip and default gateway so that we can send the arp request.

Start Arp Poisoning:

Lets poison the victim’s network

Man in the Middle Attack on Windows with Cain and Abel

Also read Driftnet – Tool used to capture images that your friend looking Online

Victims Traffic Captured

Now the attacker has successfully poisoned victim, as the result below shown arrow is victims destination IP’s, Attacker can resolve this ip and view the website the victim has visited.

Man in the Middle Attack on Windows with Cain and Abel

Also read URLSnarf – Tool used to capture website links that your friend looking Online

Disclaimer

This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and www.gbhackers.com will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

BALAGANESH is an Information Security Analyst at COMODO Security Solutions(Incident Response Team).Passionate for Information Security.Completed B.E Electronics,M.Sc Cyber Forensics and Information Security,Certified Ethical Hacker,Technical Writer.
Shares