Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. It is capable of intercepting traffic on a network segment, capturing passwords and conducting active eavesdropping against a number of common protocols.
A MITM(man-in-the-middle) attack happens when a communication between two systems is intercepted by an outside entity. This can happen in any form of online communication, such as email, social media, web surfing, etc. Not only are they trying to eavesdrop on your private conversations, they can also target all the information inside your devices.
The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required.
we will use Ettercap to perform an ARP spoofing attack and set ourselves between a client and a web server.
Step 1:-Open Ettercap and its default install in kali Linux Under Sniffing and Spoofing.
Get Ready :-
Step 2:- Click on Unifield sniffing under sniff
Step 3:- Click Ok
Step 4:- Now Ettercap should load into attack mode. Click on Hosts and select Scan for hosts from the menu.
Step 5:- Click on Hosts again, and this time select Hosts list from the menu.
Step 6:- Click the IP address of the router and click the Add to Target 1 button. Here i have used to target my Window i.p
Step 7:- Now your target i.p Added.
Step 8:- Now click Mitm on the toolbar and select Arp poisoning…
Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computers ARP cache with a forged ARP request and reply packets.
Step 9:- When the question box shows up, check the box next to Sniff remote connections and hit.
Step 10:- Start Sniffing