#NetworkProject
Man in the middle Attack. It's like Wireshark but more complicated.
![[Pasted image 20240424110911.png]]
Who is the victim attacking a network?
- It's the router.
![[Pasted image 20240424114550.png]]
we do nmap between the ip addresses of -.12 and -.20
https://github.com/sbeteta42/zenmap/
we install ZENMAP for a more beautiful UI of nmap
on zenmap we can see everything with details.
but should install the nmap_vulnerabilities file before to be able to see better. https://github.com/sbeteta42/nmap_vulner
steps in the Projet_Reseau/nmap_vulners.pdf
then we get the code from the PDF to test
--script vulners --script-args mincvss=5.0
and add it to the search term in zenmap to search in more details.
![[Pasted image 20240424122633.png]]
To activate the routage
![[Pasted image 20240424134824.png]]
we did this code to do --what-- ?
![[Pasted image 20240424135131.png]]
on the terminal on the left we did this: #arpspoof -i eth0 -t <victim ip> <gateway ip> -r
on the terminal below we enter this command #mitmproxy --mode transparent
we tried to enter credentials to a site (not certified) ![[Pasted image 20240424135840.png]]
going back to kali in the mtim (man in the middle) we see the details as in wireshark
![[Pasted image 20240424135953.png]]
we go to https POST and we see the credentials.
![[Pasted image 20240424140021.png]]
that's crazy !!
arp command to see MAC addresses of the devices on the subnetwork.