Man In The Middle (MITM) attack
In this recipe, we will use a Man In The Middle (MITM) attack against one of our targets. A MITM attack works by allowing us to eavesdrop on the communication between our target and their legitimate party. For our example, we could utilize Ettercap to eavesdrop on the communication of a Windows host while checking their e-mail on http://www.yahoo.com.
Getting ready
To execute this recipe we will need the following:
A wireless connection to the network
A machine on the network connected to the wireless network
How to do it...
Let's begin the Man In The Middle attack by launching Ettercap.
Open a terminal window and start Ettercap. Using the
–G
option launches the GUI (Graphical User Interface):ettercap –G
We begin the process by turning on unified sniffing. You can press Shift + U or use the menu and go to Sniff | Unified sniffing..., as shown in the following screenshot:
Select the network interface. In the case of using a MITM attack, we should select our wireless...