O'Reilly logo

Kali Linux Cookbook by David De Smet, Willie L. Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Man In The Middle (MITM) attack

In this recipe, we will use a Man In The Middle (MITM) attack against one of our targets. A MITM attack works by allowing us to eavesdrop on the communication between our target and their legitimate party. For our example, we could utilize Ettercap to eavesdrop on the communication of a Windows host while checking their e-mail on http://www.yahoo.com.

Getting ready

To execute this recipe we will need the following:

  • A wireless connection to the network
  • A machine on the network connected to the wireless network

How to do it...

Let's begin the Man In The Middle attack by launching Ettercap.

  1. Open a terminal window and start Ettercap. Using the –G option launches the GUI (Graphical User Interface):
    ettercap –G
    
  2. We begin the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required