SlideShare a Scribd company logo
HACKING WITH BACKTRACK 5 R3
Zia Ush Shamszaman
ANLAB, ICE, HUFS
Date: 20130305
1
!!Caution!!
This material is for educational
purpose only. We don't intend to ha
ck, crack or anything related to
cyber crime
2
3
The scenario
Gateway
Victim
Attacker
4
MITM attack scenarios
Different attacks in different scenarios:
LOCAL AREA NETWORK:
- ARP poisoning - DNS spoofing - STP mangling
- Port stealing
FROM LOCAL TO REMOTE (through a gateway):
- ARP poisoning - DNS spoofing - DHCP spoofing
- ICMP redirection - IRDP spoofing - route mangling
REMOTE:
- DNS poisoning - traffic tunneling - route mangling
5
MITM ATTACK TECHNIQUES
THE LOCAL SCENARIO
6
Local attacks (1)
ARP poisoning
• ARP is stateless (we all knows how it works and what
the problems are)
• Some operating systems do not update an entry if it i
s not already in the cache, others accept only the first
received reply (e.g. Solaris)
• The attacker can forge spoofed ICMP packets to forc
e the host to make an ARP request. Immediately after
the ICMP it sends the fake ARP reply
7
The scenario
Gateway
Victim Attacker
Gratuitous ARP (forged)
Gratuitous ARP (forged)
8
Local attacks (1)
ARP poisoning - Tools
• ettercap (http://ettercap.sf.net)
• Poisoning
• Sniffing
• Hijacking
• Filtering
• SSH v.1 sniffing (transparent attack)
• dsniff (http://www.monkey.org/~dugsong/dsniff)
• Poisoning
• Sniffing
• SSH v.1 sniffing (proxy attack)
9
Local attacks (1)
ARP poisoning - countermeasures
• YES - passive monitoring (arpwatch)
• YES - active monitoring (ettercap)
• YES - IDS (detect but not avoid)
• YES - Static ARP entries (avoid it)
• YES - Secure-ARP (public key authentication)
10
Local attacks (2)
DNS spoofing
HOST DNSserverX.localdomain.in
10.1.1.50
MITM
10.1.1.1
If the attacker is able to sniff the ID of the DNS request,
he/she can reply before the real DNS server
• ettercap (http://ettercap.sf.net)
• Phantom plugin
• dsniff (http://www.monkey.org/~dugsong/dsniff)
• Dnsspoof
• zodiac (http://www.packetfactory.com/Projects/zodiac)
11
Local attacks (2)
DNS spoofing - tools
Man in the Middle Attack
Before we going to start ettercap we have to configure the /etc/etter.conf
file at /etc.etter.conf
Remove two # from here
12
Man in the Middle Attack in BT
13
Step-1
14
Step-2
15
Step-3
16
Step-4
17
Step-5
18
Step-6
Add the Gateway
19
Step-7
Select Victim IP
20
Step-8
21
Step-9
22
Step-10
23
Step-11
24
Step-12
25
Step-13
26
Step-14
27
Step-15
28
Step-16
29
Don’t do anything harmful
Thank You J
30
How Port and IP works !
31
HOW DNS Query Works
32

More Related Content

PPTX
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
PDF
Practically DROWNing
PDF
Git Money
PPTX
IoT and IIOT at QuBit Prague 2018
PPTX
Hacking routers as Web Hacker
PDF
Mototrbo
PDF
Radio Stuff Hacking - Linux Day 2018
PPTX
Олег Купреев «Уязвимости программного обеспечения телекоммуникационного обору...
Defcon Moscow #0x0A - Oleg Kupreev "Uncommon MiTM in uncommon conditions"
Practically DROWNing
Git Money
IoT and IIOT at QuBit Prague 2018
Hacking routers as Web Hacker
Mototrbo
Radio Stuff Hacking - Linux Day 2018
Олег Купреев «Уязвимости программного обеспечения телекоммуникационного обору...

What's hot (8)

PPTX
Sandbox detection: leak, abuse, test - Hacktivity 2015
PPTX
BackTrack 4 R2 - SFISSA Presentation
PDF
SDR 101 - NDSU CyberSecurity 2017
PPT
nullcon 2010 - Botnet mitigation, monitoring and management
PDF
SDR101-presentation-distro
PPT
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
PDF
Mikhail Belopuhov: OpenBSD: Where is crypto headed?
PPTX
如何利用 Docker 強化網站安全
Sandbox detection: leak, abuse, test - Hacktivity 2015
BackTrack 4 R2 - SFISSA Presentation
SDR 101 - NDSU CyberSecurity 2017
nullcon 2010 - Botnet mitigation, monitoring and management
SDR101-presentation-distro
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Mikhail Belopuhov: OpenBSD: Where is crypto headed?
如何利用 Docker 強化網站安全

Similar to Hacking with Backtrack Lecture-3 (20)

PDF
04-post-connection-attacks.pdf
PPT
How hackers attack networks
PPTX
Introduction Ethical hacking by eslam hussein
PPT
Module 5 Sniffers
PPTX
lecture5.pptx
PPTX
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
PPTX
Network And Application Layer Attacks
PPT
6005679.ppt
PPT
1unit2ndpart
PDF
Ettercap_Tool_Kali_Linux_Tool_Presentation
PPTX
packet sniffing with Wireshark and its implementation.pptx
PPTX
Uncommon MiTM in uncommon conditions
PPTX
Man in The Middle Attack
PPS
Workshop on BackTrack live CD
PPT
Kunal - Introduction to backtrack - ClubHack2008
PPT
Kunal - Introduction to BackTrack - ClubHack2008
PDF
Day 2 Dns Cert 4a Cache Poisoning
PDF
Coporate Espionage
PPT
Hacking Cisco
PPT
04-post-connection-attacks.pdf
How hackers attack networks
Introduction Ethical hacking by eslam hussein
Module 5 Sniffers
lecture5.pptx
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Network And Application Layer Attacks
6005679.ppt
1unit2ndpart
Ettercap_Tool_Kali_Linux_Tool_Presentation
packet sniffing with Wireshark and its implementation.pptx
Uncommon MiTM in uncommon conditions
Man in The Middle Attack
Workshop on BackTrack live CD
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
Day 2 Dns Cert 4a Cache Poisoning
Coporate Espionage
Hacking Cisco

More from Zia Ush Shamszaman (12)

PDF
Pdfslide.net book of-abstracts-insight-student-conference-2015
PDF
Hacking with Backtrack Lecture-2
PDF
Hacking with Backtrack Lecture-1
PDF
On the need for applications aware adaptive middleware in real-time RDF data ...
PDF
On the need for applications aware adaptive middleware in real-time RDF data ...
PDF
L 19 ct1120
PDF
L 18 ct1120
PDF
L 17 ct1120
PDF
L 15 ct1120
PDF
L 14-ct1120
PDF
linear search and binary search
PDF
Bangladesh
Pdfslide.net book of-abstracts-insight-student-conference-2015
Hacking with Backtrack Lecture-2
Hacking with Backtrack Lecture-1
On the need for applications aware adaptive middleware in real-time RDF data ...
On the need for applications aware adaptive middleware in real-time RDF data ...
L 19 ct1120
L 18 ct1120
L 17 ct1120
L 15 ct1120
L 14-ct1120
linear search and binary search
Bangladesh

Recently uploaded (20)

PPTX
Machine Learning_overview_presentation.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPT
Teaching material agriculture food technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Approach and Philosophy of On baking technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Big Data Technologies - Introduction.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
cuic standard and advanced reporting.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
A Presentation on Artificial Intelligence
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine Learning_overview_presentation.pptx
Electronic commerce courselecture one. Pdf
MIND Revenue Release Quarter 2 2025 Press Release
Teaching material agriculture food technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25-Week II
The Rise and Fall of 3GPP – Time for a Sabbatical?
Approach and Philosophy of On baking technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
Big Data Technologies - Introduction.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
cuic standard and advanced reporting.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
A Presentation on Artificial Intelligence
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Hacking with Backtrack Lecture-3