Kali Linux – Sniffing and Spoofing
[Disclaimer: The content of this article is for educational purposes only. It was written to help readers test their skills on using computers and/or Kali Linux and share knowledge about Kali Linux to the users. The writer of this article/guide take no responsibility for actions resulting from the inappropriate usage of informations contained of this article/guide.]
Yow guys, welcome to the Hacking Articles and this is the real thing now because from now on, I will be discussing some tools that was needed by ethical hackers and by malicious hackers too, sniffing and spoofing is like wiretapping and Kali Linux made some popular tools for this purpose.
Burpsuite
-This can be used as a sniffing tool between your browser and the webservers to find the parameters that web application uses.
To open this one, go to Applications -> Web Application Analysis -> burpsuite.
Step 1: To make the setup of sniffing, we need to configure burpsuite to behave as a proxy by going to "Options" and check the proxy IP with port 8080.
Step 2: Configure the browser proxy which is the IP of burpsuite machine and the port.
Step 3: To start interception, go to Proxy -> Intercept -> click "Intercept is on" and continue to navigate on the webpage that you want to find the parameter to test for vulnerabilities.
In this case, it is metasploitable machine with IP 192.168.1.102
Step 4: Go to "HTTP History". In Raw and the hidden parameter such as the Session ID and the other parameter such as user name and password has been shown.
mitmproxy
-is an SSL-capable man-in-the-middle HTTP proxy. It provides a console interface that allows a traffic flows to be inspected.
To open this one, type "mitmproxy -parameter to the terminal and to start the mitmproxy, type "mitmproxy -p portnumber"
Wireshark
-This is one of the best data packet analyzers that analyzes deeply the packets in the frame level. Know more about wireshark at: . To open it, Go to Applications -> Sniffing & Spoofing -> wireshark.
Once you click the wireshark, a GUI will open up and you will need to click "Start" so the packet capturing will start.
sslstrip
-It is a MITM attack that forces a victim's browser to communicate in plain-text over HTTP, and the proxies modifies the content from an HTTPS server. To do this process, sslstrip is "stripping" https:// URLs and turning them into http:// URLs
To open and use this one, go to Applications -> 09-Sniffing and Spoofing -> Spoofing and MITM -> sslstrip.
To set it up, write to forward all the 80 port communication to 8080 then, start the sslstrip command for the port needed.
And now the end is near, and then I faced the final curtain, haha that's it for today guys, thanks again for reading and reading and reading hehe, hope you learn something and I hope you like it, for more info and questions just comment below and I will try to answer all of your questions.
YOU ARE READING
Hacking Articles
RandomHacking Articles is an article/guides about basic hacking and any topics related to Hacking/Technology. This was written by Rovic Balingbing a.k.a. Baby Esue, it consists of 30 parts, this "Hacking Articles" consists of some articles, guides, tutor...
