This tutorial is about a script written for the How to Conduct a Simple Man-in-the-Middle Attack written by the one and only OTW.
Hello script kiddies, Just running a script doesn't give you the understanding of what's going on under the hood. Hence it's not hacking.
Please read the the well written tutorial by the OTW before continuing. You will get a good understanding of what's going on under the hood and the tools that are used and why.
It will scan for victims, auto detect local interface and default gateway. Also set up the MitM attack for the victim, router, ipforward, and restore the victim when done.
All you need to do is enter the victim's IP Address. That's it.
Kali Linux or any pentesting distro
After Target Poisoned:
Run sniffers in external terminals
Note: Your local interface may differ
driftnet -- Will capture all image traffic, when victim browse a website.
urlsnarf -- Captures all victim's website addresses visited by victim's machine.
dnsiff -- Sniffs cleartext passwords. Unique authentication attempts.
webspy -- Watches in real-time as the victim surfs, your browser surfs along with them, automagically.
Click the 'Download' option on the left, then 'Download repository'.
No need to state the obvious about the educational blah blah.
Written by: n0neXn0ne
Please leave question in comment section below.
Want to start making money as a white hat hacker? Jump start your White-Hat Hacking career with our 2020 Premium Ethical Hacking Certification Training Bundle from the new Null Byte Shop and get over 60 hours of training from Ethical Hacking Professionals.