Answer the question
In order to leave comments, you need to log in
What is the best MITM attack method?
Hello, I'm asking for help, as I want to learn more and more. I myself am studying at the IS 2 course of the technical school. Discovered Kali linux. I even made a separate bootable flash drive for this, so that everything was beautiful. In general, the essence of the question is:
What kind of Mitm attack is best suited for wlan0. Arp-poisoning,DHCP spoofing, NDPpoisoning. If none, then please explain (Do not judge strictly, I'm just learning).
Answer the question
In order to leave comments, you need to log in
Do not judge strictly: I will answer as it is.
Why do
I even made a separate bootable flash drive for this, so that everything was beautiful.even
What kind of Mitm attack is best for wlan0. Arp-poisoning,DHCP spoofing, NDPpoisoning. If none, then please explain (Do not judge strictly, I'm just learning).
What a shame. Kali linux is for those who don't understand what they want to do. The best mitm is when dlp agents are installed and ssl certificates of your center are added to trusted ones. If you want ib, first study iso 2700x and iso 900x, then the legislation of your country in this area. IB and redteam are different things by the way. If you want meat - study networks, tcp / ip implementations, problem areas to start with, C and assembler. Learn to use wireshark and debuggers. Ready-made tools incl. metasploit, aircrack and other trash, any schoolkick can mousepoke.
ps And before you draw a network diagram, learn how to draw a diagram of people.
It's all bullshit. It all comes down to brute-force password dictionaries. For modern routers, this is ineffective.
What is the end goal?
> wlan0
> Arp-poisoning,DHCP spoofing, NDPpoisoning
Connect to a neighbor's network and shit?
What you listed are not types of attack, but attack technologies. In a real attack, several technologies are usually used at once.
Let me explain with an example:
In a real burglary (for example, during a robbery), valuable items are protected by multilayer protection. For example, the apartment is protected by bars on the windows (considers break-in through the window) and an alarm system; valuable items are in the safe, the location of the safe in the apartment is unknown.
A successful break-in requires opening the bars on the windows, disabling the alarm, finding the safe and opening the safe; Well, successfully leave with the prey.
Similarly, networks are protected by several layers. And the methods you listed are used for different layers of protection.
DHCP spoofing is generally only useful where someone is using DHCP. It cannot be said whether it is better or worse than the others. It's just for a specific (quite common, but not ubiquitous) situation.
PS: I remind you that hacking networks and intercepting other people's data is punishable by law. And you won't like it in prison.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question