Packet Sniffing Attack (MITM Attack)

  •   What is Packet Sniffing?

--> Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet, or a defined subset of packets, may be gathered for further analysis. You as a network administrator can use the collected data for a wide variety of purposes like monitoring bandwidth and traffic

  •   How This Works?

--> A packet sniffer, sometimes called a packet analyzer, is composed of two main parts. First, a network adapter that connects the sniffer to the existing network. Second, software that provides a way to log, see or analyze the data collected by the device.


Step1:-

  • Using your system connect into victims network(WIFI Network)
Step2:-
  • open new root terminal in Kali Linux 
Step3:-
  • Start Ettercap(GUI)
  • Write 'ettercap -g'

Step4:-
  • It will open Ettercap GUI 
  • Click on ✔

Step5:-

  • Click on scan for host

Step6:-
  • After completing scan it show scanned host in host list










Step7:-

  • Click on host list


Step8:-

  • Select victim system as Targate1 


Step9:-

  • To show our targate click on current targate


Step10:-

  • For start sniffing click on ARP Poissoning

  • Then after click on ok
Step11:-

  • Open new terminal and write wireshark
  • 'wireshark'


Step12:-

  • It will show you network traffic pass by you in wave form


Step13:-

  • Click on the blue fin
  • It will show you in brief  like which protocol is used etc.


Step14:-

  • Now we will open youtube on victims machin



Step15:-

  • Now type in wireshark filter contains youtube or what you find












Comments

Popular posts from this blog

Exploiting Windows 10 using payload and reverse_tcp(Metasploit)

What is TCP

What is reverse_tcp