1 00:00:00,120 --> 00:00:00,840 Hello everybody. 2 00:00:00,900 --> 00:00:05,700 And welcome back to the last video in the man in the middle attack section. 3 00:00:05,700 --> 00:00:11,670 Now we will cover the usage of ether cap which is a tool that comes pre installed in clinics. 4 00:00:11,670 --> 00:00:13,230 So let us get started. 5 00:00:13,260 --> 00:00:19,260 Now this tool has two interfaces one is the interface over terminal so basically command line interface 6 00:00:19,290 --> 00:00:21,860 and the other one is the interface. 7 00:00:21,870 --> 00:00:27,930 Now you can access the command line interface just by typing it or cap and it will give you your available 8 00:00:27,930 --> 00:00:28,800 options. 9 00:00:28,800 --> 00:00:32,240 Now it asks you to select interface nurse so you can do that. 10 00:00:32,250 --> 00:00:36,220 But right now what I want to show you is the gooey interface. 11 00:00:36,420 --> 00:00:39,240 They have some differences but they are the same tool. 12 00:00:39,270 --> 00:00:46,320 So now you can find a good interface going to these sniffing spoofing and then you go to the ether cap 13 00:00:46,470 --> 00:00:47,750 which is right here. 14 00:00:47,850 --> 00:00:49,970 This is the graphical user interface. 15 00:00:50,070 --> 00:00:53,090 You click on it and it should open up the tool. 16 00:00:53,100 --> 00:00:55,850 Now we will not cover the tool in great detail. 17 00:00:55,850 --> 00:00:58,430 We will only cover some of the options available right here. 18 00:00:59,190 --> 00:01:06,200 So let us get started now what you want to do basically first of all you want to go to the files sniff 19 00:01:06,270 --> 00:01:08,100 and choose type of sniffing. 20 00:01:08,100 --> 00:01:11,130 So what you want to do is choose unified sniffing. 21 00:01:11,190 --> 00:01:15,860 Most likely in some other cases you might want to choose pre sniffing. 22 00:01:15,870 --> 00:01:18,360 But right now we'll go with unified. 23 00:01:18,360 --> 00:01:20,970 And here you can select your network interface. 24 00:01:20,970 --> 00:01:23,520 Now I only have the 88 0. 25 00:01:23,520 --> 00:01:29,160 If you have your wireless network card adapter connected you can selected right here if you want to 26 00:01:29,160 --> 00:01:33,200 use that one right now I will just go with the 88 0. 27 00:01:33,230 --> 00:01:34,130 So just click here. 28 00:01:34,140 --> 00:01:37,530 OK. 29 00:01:37,650 --> 00:01:41,590 And right here we can see down down there started unified sniffing. 30 00:01:41,610 --> 00:01:47,280 Now what you want to do right after this is basically go to the hosts and you want to scan for all the 31 00:01:47,280 --> 00:01:49,860 hosts on the local area network. 32 00:01:49,860 --> 00:01:51,700 So scan for the hosts. 33 00:01:51,840 --> 00:01:57,900 It will scan all possible 255 hosts and it will show you which hosts are currently up on your local 34 00:01:57,900 --> 00:01:58,920 network. 35 00:01:58,980 --> 00:02:02,180 It will say for hosts added to the host lists. 36 00:02:02,190 --> 00:02:04,690 Now we to access the host list. 37 00:02:04,690 --> 00:02:11,870 So basically just go here hosts and then hosts less here you will have the all of the devices that are 38 00:02:11,870 --> 00:02:17,130 currently connected and online on your local area network as we can see. 39 00:02:17,150 --> 00:02:24,750 Now let me just check out what is the IP address of my oh my understand machine. 40 00:02:24,800 --> 00:02:26,510 It is not one but three. 41 00:02:26,720 --> 00:02:32,570 This one is my laptop and this one I believe is making a Linux machine since there isn't really any 42 00:02:32,570 --> 00:02:36,570 else much any else machine on the network currently. 43 00:02:36,620 --> 00:02:39,820 Now what you want to do now to have to date. 44 00:02:40,040 --> 00:02:43,790 Let's say we want to target our Windows 10 machines. 45 00:02:43,790 --> 00:02:51,080 So we want to ask both deep understand machine what you want to do is basically click on the router 46 00:02:51,290 --> 00:02:53,480 and then add it to the target one. 47 00:02:53,750 --> 00:03:01,040 So at router to target one and it will say right here host one and 192 that 168 that one had to target 48 00:03:01,050 --> 00:03:07,190 one then what you want to do is choose your Windows 10 machine which in or basically any other machine 49 00:03:07,190 --> 00:03:11,510 you want to ask both and choose right here added to Target to 50 00:03:15,400 --> 00:03:17,740 and then let me just see where it is. 51 00:03:17,740 --> 00:03:24,130 View target's current targets right here and here you will have the list of the targets. 52 00:03:24,130 --> 00:03:26,080 Now what you want to do after this. 53 00:03:26,080 --> 00:03:32,350 Basically let me just go to the shelter I believe it is right known it's not right here 54 00:03:35,850 --> 00:03:38,570 you can go to the Rizzo IP addresses 55 00:03:41,560 --> 00:03:46,900 and what you want to do after this is basically go to the man in the middle which is is right here and 56 00:03:46,900 --> 00:03:49,550 Jews are poisoning. 57 00:03:49,770 --> 00:03:55,160 This will ask you if you want to sniff remote connections on only in one way. 58 00:03:55,230 --> 00:03:58,200 Right now we want to sniff remote connections click here. 59 00:03:58,200 --> 00:03:58,790 OK. 60 00:03:58,830 --> 00:04:05,460 And you will see that the ARB spoofing has started now everything that your target's now or your target 61 00:04:05,550 --> 00:04:09,760 actually types in an age TTP website will be shown right here. 62 00:04:09,790 --> 00:04:16,410 So if it was a tenacity TTP upsets and tries to log into some page you will see the username and password 63 00:04:16,500 --> 00:04:18,180 in clear text right here. 64 00:04:18,180 --> 00:04:22,680 So now nothing you can do is basically let me just see 65 00:04:25,440 --> 00:04:27,020 where is the plug in. 66 00:04:27,030 --> 00:04:28,070 Manage the plug in. 67 00:04:28,080 --> 00:04:30,280 So just click on manage the plugins. 68 00:04:30,300 --> 00:04:38,520 And here you have two type of plugins that you can add for example DNS spoof sent spoof DNS replies. 69 00:04:38,520 --> 00:04:43,050 You can also run DOS attack and you can run all of the other attacks as well. 70 00:04:43,050 --> 00:04:47,440 Now I believe this is the here is DSL strip as well as in the previous two. 71 00:04:47,460 --> 00:04:49,560 So you can roll the SSL slip as well. 72 00:04:50,040 --> 00:04:55,120 And this basically performs the same as e the previous toll that we cover. 73 00:04:55,110 --> 00:05:04,410 So if I were to for example visit an ETP page and log in for example it would be showed right here. 74 00:05:04,480 --> 00:05:11,200 Now that is the simple use of this tool if you want to you can try out all of these plugins right here 75 00:05:11,230 --> 00:05:15,890 but there are really most of them are not really that important. 76 00:05:16,400 --> 00:05:21,720 Or most of them are actually only there for you to specify a more detailed attack. 77 00:05:21,790 --> 00:05:27,910 This will do its job for now on you can you might want to add DSL strip and DNS spoofing later on but 78 00:05:27,910 --> 00:05:30,220 we already did that in the previous two. 79 00:05:30,310 --> 00:05:33,400 We will not be doing that in this tool as well. 80 00:05:33,460 --> 00:05:38,910 And I just wanted to show you how this tool works and that will be it about this tutorial. 81 00:05:38,950 --> 00:05:46,540 So in this section we covered the man in the middle framework we showed how to download it how to use 82 00:05:46,540 --> 00:05:46,710 it. 83 00:05:46,740 --> 00:05:53,390 We ran some different types of attacks such as for example randomize images then using a screen shot 84 00:05:53,390 --> 00:06:01,780 her then are spoofing DNS spoofing and recaptured the usernames and passwords on ATP as Web sites as 85 00:06:01,780 --> 00:06:11,470 well as on as well as on ATP while performing the SSL strip and those could be some of the useful attacks 86 00:06:11,470 --> 00:06:14,290 that you can perform on your local network. 87 00:06:14,290 --> 00:06:21,040 Now these attacks do not work on the outside of your local network so they only work for all the targets 88 00:06:21,100 --> 00:06:28,180 on your father's network or on your basically connect data connected to a router and in the next section 89 00:06:28,270 --> 00:06:34,930 we will start learning system hacking so we will for example learn the metal plate framework in great 90 00:06:34,930 --> 00:06:41,470 details we'll learn some of the exploits for that we will hack windows as well as Linux and then after 91 00:06:41,470 --> 00:06:47,650 that we will also hack some of the Android devices and Iow devices with another tool. 92 00:06:47,680 --> 00:06:49,910 So that would be about it for this section. 93 00:06:49,930 --> 00:06:55,140 I hope you enjoyed it and I hope I see you in the next section where we will start system hacking. 94 00:06:55,150 --> 00:06:57,050 Hope I see you there and take care. 95 00:06:57,140 --> 00:06:57,390 Bye.