Simulate MITM Attack
Last updated
Last updated
Man in the Middle Attack (MITM) is a type of security attack in which an attacker infiltrates and manipulates communications between two supposedly trusted parties. These attackers can spy on, alter, or even inject data into ongoing communications without the users involved knowing.
Man in the Middle attacks have great potential for danger because they can result in the theft of personal information, such as passwords, financial information, or other sensitive data. Additionally, attackers can manipulate communications to harm one or both parties involved.
Man in the Middle Attacks can occur through a variety of techniques, but essentially, the attacker places himself in the middle of supposedly secure communications. This can be done by exploiting security holes or using certain techniques which we will discuss next.
View the ARP Table before the positioning process. ARP (Address Resolution Protocol) is a protocol used to translate IP addresses into MAC addresses on a Local Area Network. A host will send an ARP request broadcast to obtain the MAC address of the destination host.
Information
Before the ARP process, Windows-Client provides all information to the Router's Mac Address. But after the ARP process is carried out, Windows-Client provides information to KaliLinux's Mac Address and then KaliLinux will forward the information to the Router.
So, KaliLinux will get all the information from the Windows-Client via the Router
Testing the FTP password From Windows-Client, try doing FTP to the router via the command in cmd
*results of ftp user & password records from the client
Testing the Web Server/HTTP server password from Windows-Client by browsing the .php database to test the website http://testphp.vulnweb.com/login.php
*result of username & password database from client