Showing posts from 2018

MITM Attack or How to get Access to Your Neighbour's Gmail

I will try to explain the two main methods of getting the victim's access to sites he visits (even those protected by HTTPS).

The methods I will talk about are based on MITM (Man in the middle) attack.
Both methods require you to connect to the victim's wifi beforehand (prerequisite).

1. Listen to all traffic from the devices on your network to the router.
2. Cheat the router and the victim to pass all of their traffic through you (as a proxy, thus gaining access to all traffic).

Listen The first method (listening mode) is more non-detectable as you don't actually disturb the victim or the router, you just listen to the packets of traffic as they go through the air.
This method can be done using two main modes:
I. Promiscuous mode - Which is a mode you can use even on windows OS, and can be enabled on many network devices.
This mode is not recommended ever using as it has lots of limitations, the most prominent one is that it can listen to traffic only on non-encrypted netw…

MITM Attack Using Windows at 2018

A year ago I wrote about my first stab at MITM attacks.

In this post I want to focus on MITM attacks using windows only tools.

What is MITM Attack? A Man In The Middle attack is an attack where the attacker is connected to the same network as the victim while positioning himself between the victim and the router thus makes himself a sort of a proxy while grabbing all of the network packets on the fly with the possibility of dumping them or even altering them.
So instead of:
Victim -> Router

It is altered to:
Victim -> Attacker -> Router

How does the MITM work ? Without delving deeply to technicalities, the attacker will need three main tools:
A. Spoofing tool - this one will make the attacker spoof the network to make the victim believe the attacker is the router thus sending all of its packets to the attacker instead of to the router, then the attacker will forward those packets to the router.

B. Dumping tool - A tool to capture all of those packets going through the attacker.

LiveCD comes to the Rescue

Any professional person needs a good toolset in order to do good work. In the case of a computer technician, that toolset will include rescue disk/s.
A rescue disk will come in handy when a computer should be accessed but the OS doesn't start, the rescue disk will contain a bootable section, which will be an alternative OS to access the computer and its drives.
A good rescue disk should have a large set of tools which should include anti viruses, partition managers, hardware analyzers and fixers as well as many common tools like a web browser, file explorer etc.
A better rescue disk should have a LiveDisk mode as well as well as a simple windows mode which will contain many tools which can be used in a healthy environment - these tools should be portable and could be used in order to fix a specific problem on a working windows OS.
The livedisk should work with or without an internet connection (which is a problem for antivrus utils as they won't have the latest virus signatur…