Man-in-the-middle attack (MITM)
In this recipe, we will use a man-in-the-middle attack (MITM) against our target. A MITM attack works by allowing us to eavesdrop on the communication between our target and their legitimate party. For our example, we could utilize Ettercap to eavesdrop on the communication of a Windows host while checking their e-mail on http://www.yahoo.com.
Getting ready
The following requirements need to be fulfilled:
A wireless connection to the network is required to complete this task
A machine on the network connected to the wireless network
How to do it...
Let's begin the MITM attack by launching Ettercap:
Open a terminal window and start Ettercap. Using the
-G
option launches the GUI:ettercap -G
We begin the process by turning on unified sniffing. You can press Shift + U or use the menu and select Sniff | Unified sniffing...:
Select the network interface. In the case of using an MITM attack, we should select our wireless interface.
Next, we turn on scanning for hosts. This...