Gatsby Default StarterGatsby logo

#NetworkProject

Man in the middle Attack. It's like Wireshark but more complicated.

![[Pasted image 20240424110911.png]]

Who is the victim attacking a network?

  • It's the router.

![[Pasted image 20240424114550.png]]

we do nmap between the ip addresses of -.12 and -.20

https://github.com/sbeteta42/zenmap/

we install ZENMAP for a more beautiful UI of nmap

on zenmap we can see everything with details.

but should install the nmap_vulnerabilities file before to be able to see better. https://github.com/sbeteta42/nmap_vulner

steps in the Projet_Reseau/nmap_vulners.pdf

then we get the code from the PDF to test

--script vulners --script-args mincvss=5.0 and add it to the search term in zenmap to search in more details.

![[Pasted image 20240424122633.png]]

To activate the routage

![[Pasted image 20240424134824.png]]

we did this code to do --what-- ?

![[Pasted image 20240424135131.png]]

on the terminal on the left we did this: #arpspoof -i eth0 -t <victim ip> <gateway ip> -r on the terminal below we enter this command #mitmproxy --mode transparent

we tried to enter credentials to a site (not certified) ![[Pasted image 20240424135840.png]]

going back to kali in the mtim (man in the middle) we see the details as in wireshark

![[Pasted image 20240424135953.png]]

we go to https POST and we see the credentials.

![[Pasted image 20240424140021.png]]

that's crazy !!

arp command to see MAC addresses of the devices on the subnetwork.