If you have not set up backtrack here is how to do it . Now let's hack the computer!
WARNING !!!!!!!!!!!!!! THIS HAS BEEN DISCUSSED TO TELL
YOU ABOUT THE WAYS IN WHICH YOUR COMPUTER MIGHT BE EXPLIOTED !!!! DO NOT
USE THIS TO HACK ANYONE !!!! READ MORE HERE !!!! DO NOT USE THIS ON ANYONE ELSE OTHER THAN YOURSELF !
The tool we are going to use is ettercap.
Ettercap is a suite for man in the middle attacks on LAN.,DNS spoofing etc..
What we are gonna do ?
We are going to perform man in the middle attacks using a basic method called arp poisoning..
What actually happens.. ?
Before ARP poisoning
After poisoning
First open Ettercap in graphical mode using :
In konsole
# ettercap -G
Sniff → Unified sniffing
and
Scan for host inside your network using
Hosts → Scan
After scan is complete we go and check the host list we got.
Now we see the MAC and IP addresses of the hosts inside the window
( Hosts → Hosts List)
These are the machines which are connected in a LAN .
From this list we need to select the machines we need to poison.
Now we choose to ARP poison the machine 192.168.1.2 (in my case) ..you can use other machines from your host list whom you want to poison and remember that the IP of the router will always be 192.168.1.1.
Next
Highlight the line containing 192.168.1.1 and click on the "target 1" button.
(It means this entry will be poisoned in the slave’s arp table so that all that slave uses on internet will first go through us.)
Highlight the line containing 192.168.1.2(in my case) it’s the victims IP address and click on the "target 2" button.
To start the ARP poisoning:
Go to
Mitm → Arp poisoning
and start the sniffer to see the activities and its done ! whatever address slave will visit you will be able to see it :)
Note : ettercap in BT is not in GUI mode you may need to install GUI mode if you don't know how to use non GUI one
Use "apt -get install ettercap-gtk"
That's it ... more backtrack tutorials ...
A tutorial on hacking your friends over the internet in BackTrack 5
Hacking WEP Wifi passwords in BT 5
Hacking webservers using Metasploit
0 comments:
Post a Comment