Perform A Man In The Middle Attack

Abdul Baasith
4 min readJul 31, 2021

--

Man in the middle attack

1 ) Sniffing

2 ) Packet Injection

3 ) Session Hijack

4 ) SSL Stripping

Man in the middle attack tools

1 ) Ettercap

2 ) betterCAP

3 ) TCP dump

4 ) Wireshark

5 ) Dsniff

I will cover Kali Linux man in the middle attack tutorial and discuss every step. I hope you liked my notes on Penetration Testing Tutorial So enjoy this Article and leave a comment on it and don’t forget to help me by sharing this article

Once a hacker has performed a “Man In The Middle” attack (MITM) on a local network, he is able to perform a number of other “Side-kick” attacks. This includes: cutting a victim’s internet connection; intercepting Emails, logins, chat messages, and many others.

Enough talk lets do it in practice

steps to follow

Finding the IP address

search “CMD” on your Windows machine. Your command prompt will appear. Now, type:

>ipconfig

Attacker using a Kali Machine

Start your Kali Linux .

Open the Terminal in your Kali Linux by pressing CTRL+ALT+T .

Type the following Command to open Ettercap GUI as shown below.

kali@kali:~$ sudo ettercap -G

Then Click on the Tick icon on the Top Bar and select Host

Our next step to find the hosts on the network. Click on the three dots and then Host you will see a menu that includes “Scan for Hosts”. Click on it and ettercap will begin scanning the network for hosts.

Now, using that same “Hosts” tab, click on “Hosts List”. This will display all the hosts that Ettercap has discovered on your network .

so you will see ip addresses and find your victims ip

Finally, go to the menu above and click on MITM tab and the drop down menu will have a selection called

“ARP Poisoning”

Select it and it will open a pop window like below. Select

“Sniff remote connections”.

And Press OK

ettercap will begin ARP poisoning and you will see ettercap respond in its main windows with the message below.

Hurray

Now, we have successfully placed ourselves between the two targets systems and all their traffic must flow through us. This is where we can now

1.delete
2.manipulate
3.impersonate
4.view all their traffic

Congratulation you have hacked !!!! the target

Some Quick Tips

How to Prevent from Man in the Middle Attack

Even you are using your home wi-fi network then you cannot claim for completely safe from the man in the middle attack because the hacker can hack into your Wi-Fi access point and then perform this attack.

So my dear friend if you want to protect yourself from the man in the middle attack then follow the given instructions:

1 ) Use VPN

2 ) Force HTTPS

3 ) used key based authentication

USE THIS FOR EDUCATIONAL PURPOSE ONLY

If you have any question you can write in the comment

Thanks for Reading!

Cheers!

--

--

Abdul Baasith
Abdul Baasith

Written by Abdul Baasith

Hi there i'm Abdul Baasith, A passionate Software Engineer . If your tool is a hammer then every problem look like a nail

No responses yet