Professional Documents
Culture Documents
2) Or,
you might also want to check the file which you were changing for
the “ipv4”, therefore type this command in a terminal to see its
state first before changing it (this command below does the same
task as in step1):
4) Now you can start your Ettercap, scan the host, choose your
victim IP and add as target2, and the router gateway IP_addr as
target1. Start “sniffing Unified” first. Verify your “host list”, then
go to MITM, and choose “ARP_poisoining”. And the Mac_addr of
your victim will change automatically and take the Mac_addr of
the Kali attacker machine.
So, bear in mind as a great attacker to change your Mac_addr
first. You can do so using macchanger command in terminal.
Acting like that, we say to the victim “hey, I am the router; and
you should pass your traffic through me”.
5) This website is a testing site for credentials input to verify in our
MITM via ettercap kali machine,
“testing-ground.scraping.pro/login”. If you want to monitor all the
devices in a specific environment, you can set the gateway as
being the target 1, and select all the other IP_addrs as the target
2.
6) If you want if you are really in the middle (as being the attacker
if you have access to some of the target devices), you can go to
“cmd” in a windows machine for example, and type “arp -a”, and
press “enter”. Your windows mac_addr will take the mac_addr of
the attacker machine. Likewise a victim might if he got monitored
by that mac_addr attacker, if the victim knew/kept before his real
mac_addr. When the attack is stopped, the victim’s device will
take its original mac_addr back.