Packet Sniffing Attack (MITM Attack)
- What is Packet Sniffing?
--> Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet, or a defined subset of packets, may be gathered for further analysis. You as a network administrator can use the collected data for a wide variety of purposes like monitoring bandwidth and traffic
- How This Works?
--> A packet
sniffer, sometimes called a packet analyzer, is composed of two main parts.
First, a network adapter that connects the sniffer to the existing network.
Second, software that provides a way to log, see or analyze the data collected
by the device.
Step1:-
- Using your system connect into victims network(WIFI Network)
Step2:-
- open new root terminal in Kali Linux
Step4:-
Step5:-
- Click on scan for host
Step6:-
Step7:-
- Click on host list
Step8:-
- Select victim system as Targate1
Step9:-
- To show our targate click on current targate
Step10:-
- For start sniffing click on ARP Poissoning
- Then after click on ok
- Open new terminal and write wireshark
- 'wireshark'
- It will show you network traffic pass by you in wave form
Step13:-
- Click on the blue fin
- It will show you in brief like which protocol is used etc.
Step14:-
- Now we will open youtube on victims machin
Step15:-
- Now type in wireshark filter contains youtube or what you find
 
Comments
Post a Comment