Home General News Man in the Middle Attack with “Cain and Abel” Tool

Man in the Middle Attack with “Cain and Abel” Tool

455
0


Cain and Abel  - CainAbel GBHackers - Man in the Middle Attack with “Cain and Abel” Tool

Active eavesdropping alters the communication between two parties who believe they are directly communicating with each other. A -in-the- allows a malicious actor to intercept, send and receive data meant for someone else. In this tutorial, we will use and to perform this attack.

Man in the Middle Attack on Windows with Cain and Abel  - man in the middle - Man in the Middle Attack with “Cain and Abel” Tool

How does It work?

  • The address resolution protocol better known as ARP allows computers to map Mac addresses to IP addresses.
  • We have to remember computers only care about the Mac address, which is the actual hardware address of the network it’s after; the IP address is just there for human benefit.
  • This system allows the computer to know who it’s supposed to be sending packets to when an IP address is specified. The man in the middle attack works by tricking ARP or just abusing ARP into updating its mappings and adding our attacker machine’s mac address as the corresponding mac address for any communication task we wish to be in the middle of. Now that we understand what we’re gonna be doing, let’s go ahead and do it.

Also read MITM attack over HTTPS connection with SSLStrip

Activate the Sniffer – Cain and Abel

Let me activate the sniffer at first so that my network adapter discover local area network IP addresses.

Man in the Middle Attack on Windows with Cain and Abel  - 4 1 - Man in the Middle Attack with “Cain and Abel” Tool

Also Read Lyft and Ford team bonded up for building self-drive car

Scanning Network:

Scan for list of IP address so that we can target the victim traffic

Man in the Middle Attack on Windows with Cain and Abel  - cain4 1 - Man in the Middle Attack with “Cain and Abel” Tool

After adding range of IP’s to scan, Select All hosts in my Subnet

Man in the Middle Attack on Windows with Cain and Abel  - cain5 - Man in the Middle Attack with “Cain and Abel” Tool

Address Resolution Protocol Poisoning

Man in the Middle Attack on Windows with Cain and Abel  - cain7 - Man in the Middle Attack with “Cain and Abel” Tool

Man in the Middle Attack on Windows with Cain and Abel  - cain8 - Man in the Middle Attack with “Cain and Abel” Tool

Select victims Ip and default gateway so that we can send the arp request.

Start Arp Poisoning:

Lets poison the victim’s network

Man in the Middle Attack on Windows with Cain and Abel  - cain9 - Man in the Middle Attack with “Cain and Abel” Tool

Also read Driftnet – Tool used to capture images that your friend looking Online

Victims Traffic Captured

Now the attacker has successfully poisoned victim, as the result below shown arrow is victims destination IP’s, Attacker can resolve this ip and view the website the victim has visited.

Man in the Middle Attack on Windows with Cain and Abel  - cain10 - Man in the Middle Attack with “Cain and Abel” Tool

Also read URLSnarf – Tool used to capture website links that your friend looking Online

Disclaimer

This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and www.gbhackers.com will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here