MITM/Layer 3 and 4
From charlesreid1
Layer 3 = Network (IP protocol, packets)
Layer 4 = Transport (TCP protocol, packets)
Contents
Attack Steps
Conducting Recon
Before carrying out any attacks, conduct recon. This is nmap territory. Here are some things you'll want to know:
- Number of clients on network
- Open ports, services running
- Operating systems
- Etc.
Layer 3 Attacks
Traffic Sniffing: Man in the Middle/Sniffing
ARP Poisoning: Man in the Middle/ARP Poisoning · Man in the Middle/Wired/ARP Poisoning
NDP (IPv6 equivalent of ARP) Spoofing: Man in the Middle/NDP Spoofing
Port Stealing: Man in the Middle/Port Stealing
Rushing Attack: Man in the Middle/Rushing Attack
Layer 4 Attacks
DHCP Attack: Man in the Middle/DHCP
SSL Attacks: SSLStrip · SSLSniff · Certificates
Tools
Flags
| monkey in the middle attacks in which an attacker tricks two parties into thinking they're communicating with each other, but both are communicating with the attacker.
Wireless Attacks: MITM/Wireless Wired Attacks: MITM/Wired
Layer 1 and 2 MITM Attacks: Network Tap: MITM/Wired/Network Tap Evil Twin Attack: Evil Twin · MITM/Evil Twin
Layer 3 and 4 MITM Attacks:
ARP Poisoning: MITM/ARP Poisoning Traffic Injection/Modification: MITM/Traffic Injection DNS Attacks: MITM/DNS · Bettercap/Failed DNS Spoofing Attack · Bettercap/Failed DNS Spoofing Attack 2 DHCP Attacks: MITM/DHCP WPAD MITM Attack: MITM/WPAD Port Stealing: MITM/Port Stealing Rushing Attack: MITM/Rushing Attack Attacking HTTPS: MITM/HTTPS
Session Hijacking: MITM/Session Hijacking
Toolz:
SSLSniff · SSLStrip · Frankencert
MITM Labs: {{MITMLabs}}
Category:MITM · Category:Attacks · Category:Kali Attack Layers Template:MITMLabs · Template:MITMFlag Flags · Template:MITMFlag · e |