Stealing Passwords Using Wireshark and Ettercap
ฝัง
- เผยแพร่เมื่อ 26 ต.ค. 2023
- Join this channel to get access to perks:
/ @pentest_tv
Using ettercap and Wireshark to capture both network traffic and stealing credentials at the same time is every ethical hacker's best-case scenario.
In this video I discuss how to perform an ethical Man-in-the-Middle attack to capture traffic from all systems within the local network by using a pentest lab and targeting my own systems. In addition, I discuss how to use Layer 2 attacks during a professional internal penetration test as part of the reconnaissance phase.
My virtual lab setup:
VirtualBox VM Engine - www.virtualbox.org/wiki/Downl...
Kioptrix Level 1.2 (#3) - www.vulnhub.com/entry/kioptri...
Kali Linux - www.kali.org/get-kali/
Visit our Discord server at: / discord
Great at explaining won’t be surprised when this channel blows up!
Thanks for watching and the positivity! 👍👍👍
you should have more subs, i like the intro and i like your style. +1 sub
Fantastic! Thanks for subscribing! You’re subscriber #1900 so kudos!! 🎉🏆🥇
Just subsrcibed, thank you for your content I really appriaciate what you do, congrats! 8)
So glad you enjoyed the video, and I truly appreciate your subscription! I’ll make more. 👍👍👍
You got a new sub 👏👏👏 love your work, Sir 👌
Thanks for joining us and welcome to the community!!
Awesome content! Keep it going
Thanks! Glad you enjoyed it and there are more videos on their way.
Thanks again!
You do all this so fucking slowly AND ITS great bro!! thank you. most just blab on thru it. Well Done
Thanks for watching and glad you found it useful! 👍👍👍
U have a new subscriber Sir!
Fantastic- thanks for subscribing!!
@@pentest_TV Thank you for the quality content!!
I was surprised that this quality of video is just 31likes. Good luck in your YT career
Thank you! Definitely trying to make as high quality as possible and hoping to be noticed by the algorithm. Appreciate you watching and commenting! 👍👍👍
@@pentest_TVMake better, even it is already perfect( i need clearer pronounciation, i am non native English)
Thanks for the input! Would English subtitles help (and not the crappy ones auto-generated by TH-cam?)
yes of course, and also you can make videos of 2 versions( for beginners (who doesnt knoe anything( like: pent test)( how to get linux) ( what is linux) and so on) and for the middle-expert
Sure - sounds like a good idea. Thanks!
I wanted to test this example if I could enter any https web page from my own computer and see the username and password and the ettercap has not shown anything at all
Attacking and compromising encryption is a different type of attack. This demonstrates an attack against the network, specifically at layer 2. Thanks for watching and commenting! 👍👍👍
So i tested in my college. Is it possible that college security is so high that when i use wireshark the only packets i capture is my virtual box and I didn’t get any packets or ip leaks from the college network. Same for nmap when i scan the college network it didn’t show any open ports and a firewall is preventing it.
Based on my experience, I highly doubt the college network security is that high, but I would strongly encourage you to not do it at your college since you don't own the network and probably don't have permission to run a layer-2 attack on it. Remember, this reroutes ALL the local network traffic through your system before heading out to the router, so it's not a passive attack. Make sure you watch my other videos on how to set up a hacking lab before attempting this.
@@pentest_TV Thanks
Pretty cool but the server was only using http, what if the connection is via https?
That’s the rub. But you can also perform SSL hijacking since you’re routing all traffic through you.
However, you’d be surprised how many unencrypted applications are used internally within an organization. Regardless, performing a layer-2 attack and being successful is a finding in itself. But it also points you to critical infrastructure that you would want to attack but not know if it’s existence without watching the traffic. So many benefits from performing the attack.
Thanks for the comment and for watching!
Thanks a lot man
No problem! Thanks for watching.
6:00 How you make wireshark black themed?
Kali is set to dark mode... settings -> appearance -> style tab
http isn't a secure socket, have you done this and it work with https or only http.
This is correct and while http isn't used often on Internet-facing websites, there are a number of plaintext protocols used extensively by users and system administrators during their day-to-day activities. Cleartext protocols are almost always found during internals including ftp, smtp, snmp, telnet, netbios, and more. Because of this, the techniques used in this video are critical to learn and perform during an internal penetration test.
Internals is where this really shines and is always one of the first things I do during an engagement. People reuse their passwords all the time and I can’t count how many times admins use their AD username and password on cleartext protocols.
Thanks for commenting and watching!
Does this only works on http??
It works on all unencrypted protocols including http, ftp, telnet, snmp and more.
new here great video
Thanks for watching and commenting! Glad you’re here. 👍👍👍
The url was http and not https right? That's not really accomplishing anything extraordinary. Did u redirect request from https to http? That would be amazing
Compromising encryption is a different type of attack, but if you think about it, the attack accomplishes more than you think. We would use this for internal penetration testing, which uses a LOT of unencrypted protocols, including ftp, smtp, snmp, telnet, netbios and more. Performing a layer-2 attack is an attack that is considered “best-practice” when performing internal pentests, so this is a critical skill to learn. Thanks for watching and commenting!👍
@@pentest_TV fair enough! Ill check out more of your vids.
Thanks, and enjoy!
u got a sub from me, nice
Thanks for joining us!
Can I know why did you use eth0?
Because i also have a wlan1 And wlan0 in my pc
Oh, good question. That was the only network card in the system. You can find out the name of your network connections by typing out “ifconfig” (without the quotes) in a command window. If you’re using a windows system it’ll be different.
Thanks for the question!
Those are wireless network cards. WLAN = wireless eth=Ethernet. Check out my hacker lab videos to copy my environment: th-cam.com/play/PL2IKcHBQPBdKI9fmq7py5RPhZ1kKm5dkD.html&si=jBRU7mRzT1wJEoew
ettercap not on win 10 ??
Not sure - I only use it on Linux.
anybody heard about encryption ?
100% an issue, but as I mentioned in the video it’s fairly rare to capture clear text authentication. But you’d be surprised how many unencrypted protocols are used within an enterprise on their internal network that this works against. My quickest win during an internal was when a Super Administrator connected to an ftp server re-using their windows SA credentials to connect. Less than 10 minutes after starting the internal and I already owned their network.
SMB 2.0 and earlier are also clear text, and that’s still very much in the wild. Port 1433 SQL is also unencrypted. The list goes on.
Thanks for watching and commenting!!
Well yeah it's http it's plaintext
True, but there are a number of plaintext protocols used extensively, especially found during internals including ftp smtp snmp telnet netbios and more.
Internals is where this really shines and is always one of the first things I do during an engagement. People reuse their passwords all the time and I can’t count how many times admins use their AD username and password on cleartext protocols.
Thanks for commenting and watching!
I'm new subscriber can you me to recover my Gmail 😭
Thanks for subscribing! Can’t help with the gmail account though.
https?😢😂
That’s a different type of attack and something I’ll cover soon - this is a layer-2 attack that’s best practice during an internal pentest.
@@pentest_TV I think https attack often face hsts problem, last time I focused on adware attack
100% agree. Hacking https during a pentest via mitm just isn’t worth the level of effort anymore.