man_in_the_middle
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| man_in_the_middle [2017/09/13 23:56] – Santi | man_in_the_middle [2019/01/04 13:06] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 28: | Line 28: | ||
| Anyway, it deals about sniffing traffic to know where is browsing the victim computer (information about URLs, images and credentials). | Anyway, it deals about sniffing traffic to know where is browsing the victim computer (information about URLs, images and credentials). | ||
| - | == dsniff == | + | === dsniff |
| At first, Let's see how //dsniff works//. To do that, we have to execute the command indicating wich interface we want to sniff. In our case, we are connected to a WiFi AP so we use //wlan0//. | At first, Let's see how //dsniff works//. To do that, we have to execute the command indicating wich interface we want to sniff. In our case, we are connected to a WiFi AP so we use //wlan0//. | ||
| Line 41: | Line 41: | ||
| {{ wiki: | {{ wiki: | ||
| - | == driftnet == | + | === driftnet |
| <code bash> | <code bash> | ||
| Line 47: | Line 47: | ||
| </ | </ | ||
| - | {{ drifnet.png }} | + | In the moment we execute this command, a new blank (and black) windows will appear. From now, this windows show every image that the victim computer load while it is surfing the web. In the next picture you can see how our victim computer (a virtualbox machine) is browsing a website (right side of the screenshot) and we can see all the pictures in the windows that // |
| - | == urlsnarf == | + | Notice that right side of the picture could be a remote machine, the victim computer (in this case we are testing with a virtual machine), and the left side if our computer, the attacker computer. |
| + | |||
| + | {{ wiki: | ||
| + | |||
| + | === urlsnarf | ||
| <code bash> | <code bash> | ||
man_in_the_middle.1505347000.txt.gz · Last modified: 2019/01/04 13:06 (external edit)