Demo:
Download: http://www.erratasec.com/erratasec.zip
extract the conetents and make/complile the binaries
After everything is complied there are three files that you need: ferret, hamster, hamster.txt (All files should be in the same folder to work)
Execute a man in the middle attack:
ettercap -Tq -M arp:remote -i eth0 /rounter_ip/ /host_ip/
or
run ferret:
./ferret -i eth0
Ferret is gonna start campturing useful information (note, you dont have to capture/sniff just before a user logs into a site. You can capture his cookies while he is already logged in and browsing the website). It dumps some information into hamster.txt about sessions and cookies that the hamster utilitie needs.
run hamster:
./hamster
Hamster then runs a local proxy webserver on port 1234. To connect to it, change your proxy settings in your browser to use 127.0.0.1 and port 1234. Now in the address bar type 'http://hamster'. When you are presented with the page you may have to refresh a couple of times until hamster sees a host/ip address. Click on the host and you would be presented with some information relating to that host and potentially websites they are on currently. Don't hesitate to click on tha www.facebook.com or www.mail.google.com. Dont be suprised if it you click on it and it takes you into someones else inbox filled with emails for subscriptions to penis enlargement products and animal porn. Don't say i didnt warn you.
Here is a quick demo of such an attack that i made.
sidejacking gmail and facebook accounts from aerokid240 on Vimeo.
No comments:
Post a Comment