MITM/Layer 1 and 2
From charlesreid1
Layer 1 = Physical layer
Layer 2 = Data Link layer
Contents
Wired
Wired MITM attacks:
- Man in the Middle/Wired
- Man in the Middle/Wired/Network Tap - notes on creating an ethernet cable tap for a wired network
Wireless
Evil Twin
The following wiki pages have notes on carrying out a wireless Evil Twin MITM attack:
- Evil Twin - background info, overview of process
- Evil Twin/Setup - how to set up the hardware to carry out the evil twin attack
- Man in the Middle/Evil Twin - once the Evil Twin AP is created, you can use it to carry out the MITM attack by creating a bridge for traffic from one interface to another and sniffing all the traffic passing through the bridge
- Man in the Middle/Evil Twin with Ettercap - to conduct a MITM attack with an Evil Twin AP, you can use ettercap to sniff the network interface bridge
Flags
| monkey in the middle attacks in which an attacker tricks two parties into thinking they're communicating with each other, but both are communicating with the attacker.
Wireless Attacks: MITM/Wireless Wired Attacks: MITM/Wired
Layer 1 and 2 MITM Attacks: Network Tap: MITM/Wired/Network Tap Evil Twin Attack: Evil Twin · MITM/Evil Twin
Layer 3 and 4 MITM Attacks:
ARP Poisoning: MITM/ARP Poisoning Traffic Injection/Modification: MITM/Traffic Injection DNS Attacks: MITM/DNS · Bettercap/Failed DNS Spoofing Attack · Bettercap/Failed DNS Spoofing Attack 2 DHCP Attacks: MITM/DHCP WPAD MITM Attack: MITM/WPAD Port Stealing: MITM/Port Stealing Rushing Attack: MITM/Rushing Attack Attacking HTTPS: MITM/HTTPS
Session Hijacking: MITM/Session Hijacking
Toolz:
SSLSniff · SSLStrip · Frankencert
MITM Labs: {{MITMLabs}}
Category:MITM · Category:Attacks · Category:Kali Attack Layers Template:MITMLabs · Template:MITMFlag Flags · Template:MITMFlag · e |