MITM/Wired
From charlesreid1
Man in the middle attacks on wired networks.
Contents
Review of How Wired Networks Work
Let's start with a little review of how wired networks actually work. Ultimately network communications boils down to a series of on-off voltages that travel through conductors (the wires in your network cable). These voltages are processed, passed on, modified, forwarded, and routed by networking infrastructure. Conducting a man-in-the-middle attack on a wired network requires knowing how nodes on a network create a representation of the network, and how that representation can be spoofed.
MAC + IP = ARP
The basic target of a wired network man in the middle attack is the ARP table. This is a table maintained by each node on a network that maps IP addresses to MAC addresses. During normal operation of the network, nodes sending or receiving packets use the ARP table to link physical devices to specific ports to help route traffic. (For example, if my ARP table says that Alice is on port 5, and I want to send a message to Alice, I put port 5 into the header of my message, and my computer and the network ensure it gets to Alice and only Alice.)
Attacking ARP
There are several attacks that can be carried out on ARP tables, depending on your objective.
The most basic kind of attack is an ARP Poisoning or ARP spoofing attack, in which an attacker convinces the gateway and the client that they are talking to each other, but in fact each of their ARP tables has been poisoned so that they are actually sending and receiving messages from the attacker.
Another type of attack is an ARP table overflow, which is useful for turning network switches (which broadcast traffic selectively to specific ports) into network hubs (which broadcast all traffic to all ports). In this type of attack, special packets create multiple fake entries in the switch's ARP table, until the table is completely full. Once that happens, the network switch can't find other clients, and so broadcasts all traffic to all ports.
MITM Scenarios
Network Tap
The network tap scenario is one in which the attacker must have physical access to the wired network. They are physically conducting a man-in-the-middle attack by using two network devices, one connected to the sheep, one connected to the gateway,
Man in the Middle/Wired/Network Tap - you can build a bridge between the two network devices, and sniff traffic crossing the bridge
In the network tap setup, the attacker physically sits between the sheep and the network router or network switch:
+--------[Target computer] | | [ Attack computer ] | | [Router]
This is a Physical Layer 1 attack.
Network Near Neighbor
The first scenario is that the attacker is a near-neighbor of the target. This means the attacker and the sheep that is the target of the attack are both connected directly to a router or network switch (see diagram below).
Man in the Middle/Wired/ARP Poisoning - an ARP poisoning attack works in this case.
+----[Target computer] | | +---[Attack computer] | | | | [Router]
With this type of configuration, a MITM attack can be carried out via ARP spoofing. Arpspoof or Ettercap are the tools for this type of job.
Tools
Ettercap - for setting up and executing a man in the middle attack. It has a variety of different methods that include ARP poisoning.
Wireshark - for viewing packets and plaintext HTTP traffic during a man in the middle session
Driftnet - for viewing images during a man in the middle session
Arpspoof - a command-line utility for ARP poisoning.
Flags
monkey in the middle attacks in which an attacker tricks two parties into thinking they're communicating with each other, but both are communicating with the attacker.
Wireless Attacks: MITM/Wireless Wired Attacks: MITM/Wired
Layer 1 and 2 MITM Attacks: Network Tap: MITM/Wired/Network Tap Evil Twin Attack: Evil Twin · MITM/Evil Twin
Layer 3 and 4 MITM Attacks:
ARP Poisoning: MITM/ARP Poisoning Traffic Injection/Modification: MITM/Traffic Injection DNS Attacks: MITM/DNS · Bettercap/Failed DNS Spoofing Attack · Bettercap/Failed DNS Spoofing Attack 2 DHCP Attacks: MITM/DHCP WPAD MITM Attack: MITM/WPAD Port Stealing: MITM/Port Stealing Rushing Attack: MITM/Rushing Attack Attacking HTTPS: MITM/HTTPS
Session Hijacking: MITM/Session Hijacking
Toolz:
SSLSniff · SSLStrip · Frankencert
MITM Labs: {{MITMLabs}}
Category:MITM · Category:Attacks · Category:Kali Attack Layers Template:MITMLabs · Template:MITMFlag Flags · Template:MITMFlag · e |