woensdag 30 december 2009

ARP-Poisoning in practice


So yesterday i did some arp poisoning. Because, you know, i knew how it worked and so, but i never actually did it. And this ARP-poisoning went pretty well. I could follow my victims (my parents by the way) on the net and see where the were going.
I managed to retrieve all their passwords as well.



For the Arp cache attack i used:
  • Cain and Abel (totally scriptkiddy i know)
  • Ettercap
  • Urlsnarf (i forgot the name but i believe it was Urlsnarf)
  • Arpspoof (from the Dsniff packet)
  • Wireshark
As you might suggest, I used all those software individually so i could check out arp-poisoning with both Windows and Linux. Oh, and by the way, I really can't believe why they didn't made a Cain and Able for the Linux. Cain and Able really is a reason for using a Windows instead of a Linux. It speeds up the process really well. A succesfull attack will be just a few clicks away. I understand as well why C&A is this famous in the scriptkiddie world. It is just to easy. You can compare it with a software to launch Nuclear missles (don't look for it on google, these software do not exist), just press on the launch button and you have started a nuclear war. Mhm...why does this remind me of Wargames?

Well that was it for yesterday, but what did i find out today. Today i made myself familiar to the python script Sslstrip for ARP-poisoning. With this script you can see even the passwords remote users type into ssl pages(https). This script makes use of an exploit to convert ssl sites (https) to normal sites (http). Well, not really convert, but the remote users gets to see an http site instead of a https site. This way the users types in his password in a http sites and so it can be viewed just as normally. This makes Sslstrip a really handy piece of software for your hackers arsenal.

Raseac_MI

0 reacties:

Een reactie posten