Hacking Tony

Cyber security tutorials

User Tools

Site Tools


man_in_the_middle

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
man_in_the_middle [2017/09/14 00:00] Santiman_in_the_middle [2019/01/04 13:06] (current) – external edit 127.0.0.1
Line 48: Line 48:
  
 In the moment we execute this command, a new blank (and black) windows will appear. From now, this windows show every image that the victim computer load while it is surfing the web. In the next picture you can see how our victim computer (a virtualbox machine) is browsing a website (right side of the screenshot) and we can see all the pictures in the windows that //driftnet// launched (left side of the screenshot). In the moment we execute this command, a new blank (and black) windows will appear. From now, this windows show every image that the victim computer load while it is surfing the web. In the next picture you can see how our victim computer (a virtualbox machine) is browsing a website (right side of the screenshot) and we can see all the pictures in the windows that //driftnet// launched (left side of the screenshot).
 +
 +Notice that right side of the picture could be a remote machine, the victim computer (in this case we are testing with a virtual machine), and the left side if our computer, the attacker computer. 
  
 {{ wiki:driftnet.png }} {{ wiki:driftnet.png }}
man_in_the_middle.1505347240.txt.gz · Last modified: 2019/01/04 13:06 (external edit)