Description
1 attachmentsSlide 1 of 1attachment_1attachment_1
Unformatted Attachment Preview
IASP 420
Project 4 – MiTM Attack with Ettercap
1. Download Ettercap from http://ettercap.sourceforge.net
(If it doesn’t run properly, you can start it from Kali)
2. After you install Ettercap, run it, and select Unified Sniffing from the Sniff menu option as show
in Figure 1.
Figure 1.
3. Select the Network Interface, which is available.
Figure 2.
4. You will be presented with the menu options, see Figure 3.
Figure 3.
IASP 420
5. Select the Hosts option and start to scan for the hosts.
Figure 4.
6. You should see the list of host that have been found.
Figure 5.
7. Select the victims’ IP Address and add it to the Target List.
IASP 420
Figure 6.
8. From the Targets menu select Current Targets. You should be able to see the victim’s IP.
Figure 7.
9. Now click to MiTM menu and select ARP poisoning.
Figure 8.
IASP 420
Figure 9.
10. You will then be presented with a window once again which is similar to Figure 7. The ARP poison attack is happening underneath. You now have access to all the traffic which is being routed
to the IP address which you have entered earlier.
11. Now open Wireshark to see the ARP poison and MiTM attack.
12. Finally, please return to the Ettercap program and select MiTM and click on Stop MiTM attack.
13. This will ensure that the ARP tables return to normal and no unnecessary snooping of a victim’s
machine takes place.
Figure 10.
Report
Present all the steps that you performed using Ettercap.
Record the MiTM attack that you executed, using the appropriate filters in the Wireshark.
Write a paragraph about MiTM attack.
Purchase answer to see full
attachment
Tags:
Programing
Network interface
Ettercap
User generated content is uploaded by users for the purposes of learning and should be used following Studypool’s honor code & terms of service.