-
April 19th, 2004, 06:49 AM
#1
Man-in-middle Attack
Hi,
I have an assignment to complete and it is implementing the Man-in-middle attack.
I have a Linksys access-point and two machines with orinoco card.
one of them is Associated to the AP. Is it possible to implement the attack using ettercap ?
the wireless card that I am using the orinoco 802.11b.
This is purely an academic assignment.
MRG.
-
April 19th, 2004, 11:24 AM
#2
Member
I understand that if you run ettercap with ARP cache poisoning or packet forging, I believe that would be your man in the middle attack.
Sniff away
-
April 19th, 2004, 12:15 PM
#3
Yes, you can use ettercap for a man in the middle attack.
Search google for "man in the middle attack" and "ettercap man in the middle attack".
Also, RTFM on ettercap and the other programs you might use (hunt , Achilles )
Have phun and do some searches on it. There is MUCH out there already.
Quitmzilla is a firefox extension that gives you stats on how long you have quit smoking, how much money you\'ve saved, how much you haven\'t smoked and recent milestones. Very helpful for people who quit smoking and used to smoke at their computers... Helps out with the urges.
-
May 1st, 2004, 08:20 PM
#4
be careful
arp posoining is risky so be careful if you do it. do not do it if you are a newbie unless you have done extenisive research....
-
May 1st, 2004, 08:33 PM
#5
I have an assignment to complete and it is implementing the Man-in-middle attack.
Really? An assignment to complete a man-in-the-middle attack? Where in blue blazes do you go to school?
-
May 1st, 2004, 08:51 PM
#6
Actually, these kinds of assignments are getting really common. My friends at purdue are always talking about these classes that teach all kinds of malicious stuff. Even at my school, upper classmen are doing all kinds of that crap. At least for net security.
-
May 1st, 2004, 09:11 PM
#7
arp poisoning is dangerous?
and you say this... why? i know i wouldn't want to be responsible for the death of an innocent arp but if its a planned test im sure it's not going to disrupt or compromise a working network.
Bukhari:V3B48N826 “The Prophet said, ‘Isn’t the witness of a woman equal to half of that of a man?’ The women said, ‘Yes.’ He said, ‘This is because of the deficiency of a woman’s mind.’”
-
May 1st, 2004, 09:53 PM
#8
Your address is spoofed to the targets in a man in the middle attack, so its not extremely dangerous. But be careful when you run ettercap, i have found that a couple of times Ive used it, it killed the remote connections when I was shutting down the que.
Another good tool to use is, Dsniff (http://monkey.org/~dugsong/dsniff/), sniffs traffic and strictly grabs passwords. Ettercap does this also but I think dsniff works much better.
The command completed successfully.
\"They drew first blood not me.\"
-
May 2nd, 2004, 02:57 AM
#9
Hi,
First it's an assignment. Second the lab that I wok in is isolated from the university's network. So it's not affecting others at any point of time.
-
May 2nd, 2004, 08:27 AM
#10
Lets see next year A+ software and hardware are done and what do I get in return. Hacking and Basic Programming.
Looks like its pretty common.
Since the beginning of time, Man has searched for the answers to the big questions: \'How did we get here?\' \'Is there life after death?\' \'Are we alone?\' But today, in this very theatre, you will be asked to answer the biggest question of them all...WHO LIVES IN A PINEAPPLE UNDER THE SEA?
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|