Hot Posts

6/recent/ticker-posts

Man In The Middle Attack Using Bettercap

Man-in-the-middle attack (MITM) is a type of cyber attack where the attacker covertly intercepts and may even modify the communications between two devices that believe they are communicating directly with each other. To execute a MITM attack, the attacker must be present on the same network as the victim in order to deceive the two devices. To initiate the attack, the tool called Bettercap can be utilized. To run Bettercap, open the terminal and enter the command "bettercap -iface [name of the network interface that is connected to the network]". The network interface that is being used can be determined by entering the command "ifconfig" in the terminal.

 

In my case it is etho0, so im just gonna type bettercap -iface eth0 and press enter.

>>bettercap --iface eth0

Once the Bettercap tool has been launched, it may appear as a blank space without any information. To simplify the process, the "help" command can be entered followed by pressing "Enter". This will display a list of available commands and their descriptions.

>>help

 

To obtain further information regarding the modules available within Bettercap, the "help" command can be followed by the name of the module of interest. For instance, to retrieve more details on the "net.probe" module, the command "help net.probe" can be entered. This will provide a description of the module and a list of its available options.

>>help net.probe

 

So, this module consist of several parameter, but for now let just keep it default and turn on the module by typing net.probe on.

>>net.probe on

 

After initiating the module, it begins scanning all devices that are connected to the same network as the user's computer. This scan includes obtaining information such as the devices' IP addresses, MAC addresses, and vendor names. To view a detailed report of the devices that were discovered during the scan, the command "net.show" can be entered. This will display the collected information in a clear and organized manner.

>>net.show 


So, Raspberry Pi is my device used to perform this attack and my ip address is 192.168.1.4. The router ip address is 192.168.1.1 knew it by Name column that is shows gateway and the rest is client connected to this network. Now we can choose which one to be our victim, for example im gonna choose 192.168.1.3 which is my own laptop running windows 10. Now lets see the module named arp.spoof.

>>help arp.spoof

 

ust like previous module it’s consist of several parameter. First lets take a look at arp.spoof.fullduplex parameter. In order to be the man in the middle we need to fool both the victim and the router by telling the router that victim’s mac address is our mac address and telling victim that router’s mac address is our mac address. So we need to set this parameter to true by typing set arp.spoof.fullduplex true. Secondly we need to set arp.spoof.targets parameter by simply giving it ip address of our victim. So in my case it will be set arp.spoof.targets 192.168.1.3.

>>arp.spoof.fullduplex true
>>
arp.spoof.targets
>>
arp.spoof.targets (Target's IP adress)
>>arp spoof on

Now we already in the middle of our victim network.
Now we can do packet sniffing using net.sniff module, so lets turn it on by typing net.sniff on.

>>net.sniff on

Now we can monitor the victims device. Watch the full video for more details. Our next part we learn how to control the victims device using MITM.

#technews #digitalmarketing #startups #entrepreneurship #cybersecurity #AI #productivity #socialmedia #contentmarketing #onlinemarketing #ecommerce #cloudcomputing #bigdata #mobileapp #programming #webdevelopment #videomarketing #emailmarketing #growthhacking #branding #manofthemiddleattack #mitm #bettercap #hacking #coding #bloging #ecommerce #ethicalhacking #kali #linux #hijaking #moucejaking #hosting #freedomain #newspaper

Reactions

Post a Comment

0 Comments

Translate