So yesterday i did some arp poisoning. Because, you know, i knew how it worked and so, but i never actually did it. And this ARP-poisoning went pretty well. I could follow my victims (my parents by the way) on the net and see where the were going.
I managed to retrieve all their passwords as well.
For the Arp cache attack i used:
- Cain and Abel (totally scriptkiddy i know)
- Ettercap
- Urlsnarf (i forgot the name but i believe it was Urlsnarf)
- Arpspoof (from the Dsniff packet)
- Wireshark
Well that was it for yesterday, but what did i find out today. Today i made myself familiar to the python script Sslstrip for ARP-poisoning. With this script you can see even the passwords remote users type into ssl pages(https). This script makes use of an exploit to convert ssl sites (https) to normal sites (http). Well, not really convert, but the remote users gets to see an http site instead of a https site. This way the users types in his password in a http sites and so it can be viewed just as normally. This makes Sslstrip a really handy piece of software for your hackers arsenal.
Raseac_MI