Performing Man In The Middle Attacks with Kali Linux
Man in the Middle attacks is some of the most frequently attempted attacks on network routers. They’re used mostly to acquire login credentials or personal information, spy on the Victim, or sabotage communications or corrupt data.
A man in the middle attack is the one where an attacker intercepts the stream of back and forth messages between two parties to alter the messages or just read them.
In this quick guide, we will see how to perform a Man in the Middle attack on a device connected to the same WiFi network like ours and see what websites are often visited by them.
The method we’re going to use will employ Kali Linux, so it’ll help to have a certain degree of familiarity with Kali before we start.
To start with our attacks, the following are crucial prerequisites:
the network interface installed on our machine
and the IP of the WiFi router that our Victim uses.
View the network interface configuration
Run the following command in the terminal to find out the name of the network interface that you’re using:
You will be displayed a long list of network interfaces, out of which you have to choose one and note it down somewhere.
As for the IP of the Router you’re using, use:
On the terminal and you will be shown the IP of your network router. Now to do further processes, I have logged in to kali root mode.
STEP 1:Obtain the IP configuration from the Victim
Next up, you need to get the IP of your Victim’s Router. This is easy, and there are several different ways you can find it out. For instance, you can use a Network Monitoring Software Tool, or you can download a routers user interface program that lets you list all the devices and their IPs on a particular network.
STEP 2:Turn on the packet forwarding in Linux
This is very important because if your machine isn’t exchanging packets, the attack will result in a failure as your internet connection will be disrupted. By enabling the packet forwarding, you disguise your local machine to act as the network router.
To turn on packet forwarding, run the following command in a new terminal:
$ sysctl -w net.ipv4.ip_forward=1
STEP 3: Redirect packages to your machine with arpspoof
Arpspoof is a preinstalled Kali Linux utility that lets you expropriate traffic to a machine of your choice from a switched LAN. This is why Arpspoof serves as the most accurate way to redirect traffic, practically letting you sniff traffic on the local network.
Use the following syntax to start intercepting packages from the Victim to your Router:
$ arpspoof -i [Network Interface Name] -t [Victim IP] [Router IP]
This has only enabled the monitoring the incoming packets from the Victim to the Router. Do not close the terminal just yet as it’ll stop the attack.
STEP 4: Intercept packages from the Router
You’re doing here the same as the previous step, except it’s just reversed. Leaving the previous terminal open as it is, opens up a new terminal to start extracting packages from the Router. Type the following command with your network interface name and router IP:
$ arpspoof -i [Network Interface Name] -t [Router IP] [Victim IP]
You’re probably realizing at this point that we’ve switched the position of the arguments in the command we used in the previous step.
Up till now, you’ve infiltrated to the connection between your Victim and the Router
STEP 5: Sniffing images from the target’s browser history
Let’s see what websites our target like to visit often and what images do they see there. We can achieve this using specialized software called driftnet.
Driftnet is a program that lets us monitor the network traffic from certain IPs and discern images from TCP streams in use. The program can display the images in JPEG, GIF, and other image formats.
To see what images are being seen on the target machine, use the following command
$ driftnet -i [Network Interface Name]
STEP 6: Sniffing URLs information from victim navigation
You can also sniff out the website’s URL that our Victim often visits. The program we’re going to use is a command-line tool known as urlsnarf. It sniffs out and saves the HTTPs request from a designated IP in the Common log format. Fantastic utility to perform offline post-processing traffic analysis with other network forensics tools.
The syntax you’ll put in the command terminal to sniff out the URLs is:
$ urlsnarf -i [Network interface name]
As long as each terminal is functional and you’ve accidentally not closed one of them, things should’ve gone smoothly for you so far.
Stopping the attack
Once you’re satisfied with what you’ve got your hands on, you may stop the attack by closing each terminal. You can use the ctrl+C shortcut to go about it quickly.
And don’t forget to disable packet forwarding that you had enabled to carry out the attack. Type in the following command in the terminal:
$ sysctl -w net.ipv4.ip_forward=0
Wrapping things up:
We’ve seen how to infiltrate a system through MITM attack and seen how to get our hands on the browser history of our Victim. There’s a whole lot you can do with the tools we’ve seen in action here, so make sure to go about seeing out walkthroughs on each of these sniffing and spoofing tools.
We hope you’ve found this tutorial helpful and that you’ve successfully carried out your first Man In the Middle attack.