Sniffing Passwords with MITMf

MITMf aims to provide a one-stop-shop for Man-In-The-Middle and network attacks while updating and improving existing attacks and techniques.

  • The framework contains a built-in SMB, HTTP and DNS server that can be controlled and used by the various plugins, it also contains a modified version of the SSLStrip proxy that allows for HTTP modification and a partial HSTS bypass.
  • As of version 0.9.8, MITMf supports active packet filtering and manipulation (basically what etterfilters did, only better), allowing users to modify any type of traffic or protocol.
  • The configuration file can be edited on-the-fly while MITMf is running, the changes will be passed down through the framework: this allows you to tweak settings of plugins and servers while performing an attack.
  • MITMf will capture FTP, IRC, POP, IMAP, Telnet, SMTP, SNMP (community strings), NTLMv1/v2 (all supported protocols like HTTP, SMB, LDAP etc.) and Kerberos credentials by using Net-Creds, which is run on startup.
  • Responder integration allows for LLMNR, NBT-NS and MDNS poisoning and WPAD rogue server support.

screenshot-from-2016-12-05-21-26-17

Follow these instructions to install MITMf on your Kali machine then run      mitmf -h to see its options.

mitmf

Type these commands: mitmf -i wlan0 –spoof –arp –hsts –dns –gateway 192.168.1.1  Just change your interface and gateway address you can get your gateway by typing route -n

screenshot-from-2016-12-05-21-28-12

Press enter to see the magic of mitmf in front of your eyes.

screenshot-from-2016-12-05-21-28-43

Information keeps on flowing. Oops HSTS is bypassed…

screenshot-from-2016-12-05-21-29-23

The userid I entered.

screenshot-from-2016-12-05-21-29-59

The password.

I tested it on a SSL-enabled banking page using my mobile phone but look I’m still able to sniff the traffic on plain text. I couldn’t make it work on Facebook, Gmail and Yahoo but I think there’s a lot of secured websites out there that you can still hack with the tool. So test it for yourself and comment below the websites that can work with MITMf. Good luck to your sniffing test!

Advertisements

Wifi Sniffing with Bettercap

What is Bettercap?

Bettercap is a powerful tool to perform various types of Man-In-The-Middle (MITM) attacks against the network, manipulate HTTP and HTTPS traffic in realtime and much more.

Some of the main features include:

  • Full and half duplex ARP spoofing.
  • The first real ICMP DoubleDirect spoofing implementation.
  • Configurable DNS spoofing.
  • Realtime and completely automatized host discovery.
  • Realtime credentials harvesting for protocols such as HTTP(S) POSTed data, Basic and Digest Authentications, FTP, IRC, POP, IMAP, SMTP, NTLM ( HTTP, SMB, LDAP, etc ) and more.
  • Fully customizable network sniffer.
  • Modular HTTP and HTTPS transparent proxies with support for user plugins + builtin plugins to inject custom HTML code, JS or CSS files and URLs.
  • SSLStripping.
  • Builtin HTTP server.

And much more! – Bettercap website

To cut it short this tool can sniff visited passwords and websites,spoof,sslstrip over wifi networks. Bettercap is not installed in Kali so you need to install one by typing:

  • gem install bettercap then press enter

After installing type:

  • bettercap -h  it will give you the commands available for the tool like below

1.png

The next part is choosing your victim’s mac address by using nmap or airodump. There’s a lot of tools to find the connected devices and after choosing your victim let’s move on sniffing part!

  • bettercap -X -L -T (mac address…)

2While you have the option in choosing your victims one by one you can also sniff all the devices connected to the network with the next command.

  • bettercap -X -L

3There’s more useful commands with bettercap available, it depends on what you want to capture, you can even specify the parsers to use. Endless possibilities!