In this recipe, you will learn how to backdoor executables using a man-in-the-middle (MITM) attack. When downloading software from online sources, you should always be careful and verify that the software you have downloaded has not been altered by an adversary in transit.
In this recipe, we will use a MITM framework for MITM attacks to perform an ARP spoofing attack on the Windows 10 target machine, use SSLstrip to transparently hijack HTTP traffic on a network, and map HTTPS links into look-alike HTTP links and then backdoor executables sent over HTTP using the Backdoor Factory.
Before we begin, we need to download and install the latest version of the MITM framework; we start by downloading all the external libraries and dependencies using the following command:
apt install python-dev python-setuptools libpcap0.8-dev libnetfilter-queue-dev libssl-dev libjpeg-dev libxml2-dev libxslt1-dev libcapstone3 libcapstone-dev libffi-dev file
Then...