O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Man-in-the-middle attack (MITM)

In this recipe, we will use a man-in-the-middle attack (MITM) against our target. A MITM attack works by allowing us to eavesdrop on the communication between our target and their legitimate party. For our example, we could utilize Ettercap to eavesdrop on the communication of a Windows host while checking their e-mail on http://www.yahoo.com.

Getting ready

The following requirements need to be fulfilled:

  • A wireless connection to the network is required to complete this task
  • A machine on the network connected to the wireless network

How to do it...

Let's begin the MITM attack by launching Ettercap:

  1. Open a terminal window and start Ettercap. Using the -G option launches the GUI:
    ettercap -G
    
  2. We begin the process by turning ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required