• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / infosec / MITM Attack Guide to LAN

MITM Attack Guide to LAN

23/02/2021 19:09 by Anastasis Vasileiadis

We assume that most of you know what a Man in the Middle (MitM) attack is. The photo below is essentially a diagram of a Man in the Middle attack.

man in the middle websploit - MITM Attack Guide to LAN

A man-in-the-middle attack is a type of attack in which a malicious user intercepts a network communication and tries to use some techniques to intercept data by receiving packets exchanged between the machines of the local network.

Man-in-the-middle attacks can be carried out in many ways, below we will see one of them.

One of the tools for this job is WebSploit. This tool integrates a number of attacks, both for websites and for Windows machines or even networks.

WebSploit is an open source program used to scan and analyze remote systems to detect various types of vulnerabilities. It is a fairly powerful tool and supports multiple vulnerabilities.

The following is a complete list of the sections that websploit supports:

Web Modules - 

  • web / apache_users - Scan Directory Of Apache Users
  • web / dir_scanner - Directory Scanner
  • web / wmap - Information Gathering From Victim Web Using (Metasploit Wmap)
  • web / pma - PHPMyAdmin Login Page Scanner
  • web / cloudflare_resolver - CloudFlare Resolver

Network Modules 

  • network / arp_dos - ARP Cache Denial Of Service Attack
  • network / mfod - Middle Finger Of Doom Attack
  • network / mitm - Man In The Middle Attack
  • network / mlitm - Man Left In The Middle Attack
  • network / webkiller - TCP Kill Attack
  • network / fakeupdate - Fake Update Attack Using DNS Spoof
  • network / arp_poisoner - Arp Poisoner

Exploit Modules

  • exploit / autopwn - Metasploit Autopwn Service
  • exploit / browser_autopwn - Metasploit Browser Autopwn Service
  • exploit / java_applet - Java Applet Attack (Using HTML)

Wireless / Bluetooth Modules

  • wifi / wifi_jammer - Wifi Jammer
  • wifi / wifi_dos - Wifi Dos Attack
  • wifi / wifi_honeypot - Wireless Honeypot (Fake AP)
  • wifi / mass_deauth - Mass Deauthentication Attack
  • bluetooth / bluetooth_pod - Bluetooth Ping Of Death Attack

These are the attacks available in the program toolbox. For some attacks you definitely need metasploit.

Installation of Websploit Framework

To install websploit, type “apt-get install websploit *”Directly to your terminal.

You can also install websploit via the git clone command by typing:

Mandate: git clone https://github.com/websploit/websploit

Once the installation is complete, enter “websploit”To get started. As you can see in the screen banner, it displays some information about the tool.

  • Last edition - 3.0.0
  • Total Modules - 20

Screenshot 2021 02 22 Man in the Middle Attack with Websploit Framework Yeah Hub - MITM Attack Guide to Local Area Network

To view all modules, type “show modulesAt your terminal.

Screenshot 2021 02 22 Man in the Middle Attack with Websploit Framework Yeah Hub1 - MITM Attack Guide to Local Area Network

The module we will use is the “network / mitm"

Screenshot 2021 02 22 Man in the Middle Attack with Websploit Framework Yeah Hub2 - MITM Attack Guide to Local Area Network

Let's take a look at the options we need to define by typing "Show options".

We see that we have to define all the options, so let's do it!

Here we used it wlan0 as an interface because we are connected to a Wi-Fi network. (To see the name of your interface, type iwconfig)

For the IP of the router, enter “route”In a new terminal to see the default gateway address.

For IP Target, you can easily scan through it Angry IP Scanner / Super Scan Tool. In this case, the IP Target is 192.168.178.21 (Win 10) and the Default Gateway address is 192.168.178.1.

Screenshot 2021 02 22 Man in the Middle Attack with Websploit Framework Yeah Hub3 - MITM Attack Guide to Local Area Network

Now we are going to do what we wanted from the beginning ση Execute the attack! All we have to do is type run in the same terminal.

You will see that a new emerging terminal called “driftnet", Which will load all the images of our target. Driftnet is the default sniffer set in the websploit framework.

Screenshot 2021 02 22 Man in the Middle Attack with Websploit Framework Yeah Hub4 - MITM Attack Guide to Local Area Network

If you want to change the sniffer, type “set SNIFFER urlsnarf ”In the same terminal that sniffs the target URL.

Screenshot 2021 02 22 Man in the Middle Attack with Websploit Framework Yeah Hub5 - MITM Attack Guide to Local Area Network

Here is the result where you can see that your target is trying to access google.com through the Chrome browser.

Screenshot 2021 02 22 Man in the Middle Attack with Websploit Framework Yeah Hub6 - MITM Attack Guide to Local Area Network

For Dsniff, type “set SNIFFER dsniff ".

Dsniff is a set of tools for password detection and network traffic analysis, for analyzing different application protocols and extracting relevant information.

Screenshot 2021 02 22 Man in the Middle Attack with Websploit Framework Yeah Hub7 - MITM Attack Guide to Local Area Network

In the above snapshot, we successfully received his username and password protocol FTP.

MITM Attack Guide to LAN was last modified: 23 February, 2021, 7: 09 pm by Anastasis Vasileiadis

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: infosecDay: linux, myth, WebSploit

You May Also Like

Ubuntu 21.04 (Hirsute Hippo) Feature Freeze
DDOS driver on WiFi network
Kali Linux 2021.1 has just been released

About Us Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Previous Post: « Guide to Reverse Shell between two Linux machines
Next Post: Guide to a Successful Phishing Attack »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.