Man In The Middle Attack (MITM)

InfoSec Blog
3 min readJan 28, 2019

--

MITM: In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

For performing this attack in Kali Linux we have a MITM framework which we have to install in Kali Linux.

MITMF : Mitmf stands for man in the middle attack framework.MITM framework provide an all Man-In-The-Middle and network attacks tools at one place. With these tools we can do lots of stuff like sniffing, spoofing, traffic interception, payload, injection etc.

There are 2 ways to install MITMF in Kali Linux.

Two ways:

  1. Terminal
  2. Browser

To install mitmf using terminal?

git clone

https://github.com/byt3bl33d3r/MITMf.git

Or

apt-get install mitmf

How to install MITMF using Browser?

First visit below website link:

https://github.com/byt3bl33d3r/MITMf

Then click on Clone or download button and click on download zip.

Things we can do with mitmf

  • injecting
  • payload
  • HTML payload
  • spoofing
  • proxy
  • ARP spoofing
  • DHCP spoofing
  • DNS spoofing

here in this practicle, we will learn how to use this mitm framework to do the attack in the victim's machine. And using this attack we will grab the credentials of victims in clear text.

**Here we will get the username and password of the victim facebook account**

To perform the attack type

Command: mitmf — arp — dns — spoof — gateway (default gateway ip ) — target(ip address ) –I eth0

In this command, we are performing arp spoofing, DNSspoofing and forcing the target to use our default gateway to get to the internet.

In target machine victim is trying to open facebook

Here in

user name is: xxxxx@gmail.com

password:123456

as soon as the victim will click on the login button. The attacker will get the credentials (plain text )in his screen.

This is how we can perform a man in the middle attack using Kali Linux.

Stay tuned for more articles on cybersecurity..

Enjoy☺☺☺☺

For more information:- https://www.infosectrain.com

--

--