Post Connection Attacks PDF
Post Connection Attacks PDF
Nmap / Zenmap
Victim
Resources
eg:internet
Victim MITM
Victim
IP: 10.0.2.7
B MAC: 00:11:22:33:44:55
IP: 10.0.2.6
MAC: 00:11:22:33:44:66
IP: 10.0.2.5
MAC: 00:11:22:33:44:44
AR
PR
Router
My esp
A Ih o nse
MA av
Ci e1
s0 0.0
0:1 .2.6 IP: 10.0.2.1
1:2
2:3 MAC: 00:11:22:33:44:20
3:4
4:6
6
C
IP: 10.0.2.7
B MAC: 00:11:22:33:44:55
IP: 10.0.2.6
MAC: 00:11:22:33:44:66
IP: 10.0.2.5
MAC: 00:11:22:33:44:44
Typical Network
Requ
Hacker e sts Access Point
Resp
onse
s
q u ests
Re
Resources
Victim o n ses
Re sp eg:internet
ARP Spoofing
Resources
eg:internet
Victim
ARP Spoofing
Resources
eg:internet
Victim
ARP Spoofing
Using arpspoof
use:
arpspoof -i [interface] -t [clientIP] [gatewayIP]
arpspoof -i [interface] -t [gatewayIP] [clientIP]
ARP Spoofing
Using MITMf
Solution:
● Use HTTPS.
● HTTPS is an adaptation of HTTP.
● Encrypt HTTP using TLS (Transport Layer Security) or SSL (Secure Sockets
Layer).
Bypassing HTTPS
Problem:
● Most websites use HTTPS
→ Sniffed data will be encrypted.
Solution:
● Downgrade HTTPS to HTTP.
DNS Spoofing
● DNS → Domain Name System.
● Translates domain names to IP addresses.
● Eg: links www.google.com to the IP of Google’s server.
204.79.197.200
bing.com A
195.44.2.1
facebook.com A
zsecurity.org A 104.27.153.174
……..etc
live.com
live.com web server
Code can be
1. Stored in a file --js-file or --html-file
2. Stored online --js-url or --html-url
3. Supplied through the command line --js-payload or --html-payload
Creating a Fake Access Point
Using Mana-Toolkit
Resources
eg:internet
Victim
Typical Network
Client 1 Reque
sts
Respo
n ses
s
Request
Access Point
Client 2 es internet
Respons
e sts
e qu
R
n ses
o
sp
Client 3 Re
Creating a Fake Access Point
Client 1 Reque
sts
Respo
n ses
s
Request
Hacker
Client 2 es
Respons
e sts internet
e qu
R
n ses
o
sp
Client 3 Re
Creating a Fake Access Point
Hacker
internet
Creating a Fake Access Point
Hacker
internet