Stealing Passwords Using Wireshark and Ettercap

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ต.ค. 2023
  • Join this channel to get access to perks:
    / @pentest_tv
    Using ettercap and Wireshark to capture both network traffic and stealing credentials at the same time is every ethical hacker's best-case scenario.
    In this video I discuss how to perform an ethical Man-in-the-Middle attack to capture traffic from all systems within the local network by using a pentest lab and targeting my own systems. In addition, I discuss how to use Layer 2 attacks during a professional internal penetration test as part of the reconnaissance phase.
    My virtual lab setup:
    VirtualBox VM Engine - www.virtualbox.org/wiki/Downl...
    Kioptrix Level 1.2 (#3) - www.vulnhub.com/entry/kioptri...
    Kali Linux - www.kali.org/get-kali/
    Visit our Discord server at: / discord

ความคิดเห็น • 72

  • @Whysoserious2-2-2
    @Whysoserious2-2-2 5 หลายเดือนก่อน +1

    Great at explaining won’t be surprised when this channel blows up!

    • @pentest_TV
      @pentest_TV  5 หลายเดือนก่อน

      Thanks for watching and the positivity! 👍👍👍

  • @DanT89
    @DanT89 8 หลายเดือนก่อน +2

    you should have more subs, i like the intro and i like your style. +1 sub

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน +1

      Fantastic! Thanks for subscribing! You’re subscriber #1900 so kudos!! 🎉🏆🥇

  • @shortcut7274
    @shortcut7274 8 หลายเดือนก่อน +2

    Just subsrcibed, thank you for your content I really appriaciate what you do, congrats! 8)

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน +1

      So glad you enjoyed the video, and I truly appreciate your subscription! I’ll make more. 👍👍👍

  • @elmaster091
    @elmaster091 7 หลายเดือนก่อน +1

    You got a new sub 👏👏👏 love your work, Sir 👌

    • @pentest_TV
      @pentest_TV  7 หลายเดือนก่อน +1

      Thanks for joining us and welcome to the community!!

  • @steventelfer8186
    @steventelfer8186 4 หลายเดือนก่อน +1

    Awesome content! Keep it going

    • @pentest_TV
      @pentest_TV  4 หลายเดือนก่อน

      Thanks! Glad you enjoyed it and there are more videos on their way.
      Thanks again!

  • @Mbro-dq2do
    @Mbro-dq2do 6 หลายเดือนก่อน +1

    You do all this so fucking slowly AND ITS great bro!! thank you. most just blab on thru it. Well Done

    • @pentest_TV
      @pentest_TV  6 หลายเดือนก่อน

      Thanks for watching and glad you found it useful! 👍👍👍

  • @jamilshekinski
    @jamilshekinski 8 หลายเดือนก่อน +1

    U have a new subscriber Sir!

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน +1

      Fantastic- thanks for subscribing!!

    • @jamilshekinski
      @jamilshekinski 8 หลายเดือนก่อน +1

      @@pentest_TV Thank you for the quality content!!

  • @toso1038
    @toso1038 8 หลายเดือนก่อน +3

    I was surprised that this quality of video is just 31likes. Good luck in your YT career

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน

      Thank you! Definitely trying to make as high quality as possible and hoping to be noticed by the algorithm. Appreciate you watching and commenting! 👍👍👍

    • @ucok1789
      @ucok1789 8 หลายเดือนก่อน +1

      ​@@pentest_TVMake better, even it is already perfect( i need clearer pronounciation, i am non native English)

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน

      Thanks for the input! Would English subtitles help (and not the crappy ones auto-generated by TH-cam?)

    • @ucok1789
      @ucok1789 8 หลายเดือนก่อน +1

      yes of course, and also you can make videos of 2 versions( for beginners (who doesnt knoe anything( like: pent test)( how to get linux) ( what is linux) and so on) and for the middle-expert

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน

      Sure - sounds like a good idea. Thanks!

  • @dardoschuster6070
    @dardoschuster6070 4 หลายเดือนก่อน +1

    I wanted to test this example if I could enter any https web page from my own computer and see the username and password and the ettercap has not shown anything at all

    • @pentest_TV
      @pentest_TV  4 หลายเดือนก่อน

      Attacking and compromising encryption is a different type of attack. This demonstrates an attack against the network, specifically at layer 2. Thanks for watching and commenting! 👍👍👍

  • @limitless2352
    @limitless2352 8 หลายเดือนก่อน +1

    So i tested in my college. Is it possible that college security is so high that when i use wireshark the only packets i capture is my virtual box and I didn’t get any packets or ip leaks from the college network. Same for nmap when i scan the college network it didn’t show any open ports and a firewall is preventing it.

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน +3

      Based on my experience, I highly doubt the college network security is that high, but I would strongly encourage you to not do it at your college since you don't own the network and probably don't have permission to run a layer-2 attack on it. Remember, this reroutes ALL the local network traffic through your system before heading out to the router, so it's not a passive attack. Make sure you watch my other videos on how to set up a hacking lab before attempting this.

    • @limitless2352
      @limitless2352 8 หลายเดือนก่อน +1

      @@pentest_TV Thanks

  • @jeffreyb4193
    @jeffreyb4193 8 หลายเดือนก่อน +2

    Pretty cool but the server was only using http, what if the connection is via https?

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน +2

      That’s the rub. But you can also perform SSL hijacking since you’re routing all traffic through you.
      However, you’d be surprised how many unencrypted applications are used internally within an organization. Regardless, performing a layer-2 attack and being successful is a finding in itself. But it also points you to critical infrastructure that you would want to attack but not know if it’s existence without watching the traffic. So many benefits from performing the attack.
      Thanks for the comment and for watching!

  • @thembamnguni3429
    @thembamnguni3429 5 หลายเดือนก่อน +1

    Thanks a lot man

    • @pentest_TV
      @pentest_TV  5 หลายเดือนก่อน

      No problem! Thanks for watching.

  • @brusslee1814
    @brusslee1814 8 หลายเดือนก่อน

    6:00 How you make wireshark black themed?

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน

      Kali is set to dark mode... settings -> appearance -> style tab

  • @Cypher57
    @Cypher57 4 หลายเดือนก่อน

    http isn't a secure socket, have you done this and it work with https or only http.

    • @pentest_TV
      @pentest_TV  4 หลายเดือนก่อน

      This is correct and while http isn't used often on Internet-facing websites, there are a number of plaintext protocols used extensively by users and system administrators during their day-to-day activities. Cleartext protocols are almost always found during internals including ftp, smtp, snmp, telnet, netbios, and more. Because of this, the techniques used in this video are critical to learn and perform during an internal penetration test.
      Internals is where this really shines and is always one of the first things I do during an engagement. People reuse their passwords all the time and I can’t count how many times admins use their AD username and password on cleartext protocols.
      Thanks for commenting and watching!

  • @user-ff4ef1nm3x
    @user-ff4ef1nm3x 6 หลายเดือนก่อน +1

    Does this only works on http??

    • @pentest_TV
      @pentest_TV  6 หลายเดือนก่อน

      It works on all unencrypted protocols including http, ftp, telnet, snmp and more.

  • @I_Unintentionally_Morph
    @I_Unintentionally_Morph 8 หลายเดือนก่อน +1

    new here great video

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน

      Thanks for watching and commenting! Glad you’re here. 👍👍👍

  • @drm5502
    @drm5502 2 หลายเดือนก่อน +2

    The url was http and not https right? That's not really accomplishing anything extraordinary. Did u redirect request from https to http? That would be amazing

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน +1

      Compromising encryption is a different type of attack, but if you think about it, the attack accomplishes more than you think. We would use this for internal penetration testing, which uses a LOT of unencrypted protocols, including ftp, smtp, snmp, telnet, netbios and more. Performing a layer-2 attack is an attack that is considered “best-practice” when performing internal pentests, so this is a critical skill to learn. Thanks for watching and commenting!👍

    • @drm5502
      @drm5502 2 หลายเดือนก่อน +2

      @@pentest_TV fair enough! Ill check out more of your vids.

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน

      Thanks, and enjoy!

  • @danithegamer9410
    @danithegamer9410 2 หลายเดือนก่อน +1

    u got a sub from me, nice

    • @pentest_TV
      @pentest_TV  2 หลายเดือนก่อน

      Thanks for joining us!

  • @matteoramanzini1842
    @matteoramanzini1842 8 หลายเดือนก่อน +1

    Can I know why did you use eth0?

    • @matteoramanzini1842
      @matteoramanzini1842 8 หลายเดือนก่อน

      Because i also have a wlan1 And wlan0 in my pc

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน

      Oh, good question. That was the only network card in the system. You can find out the name of your network connections by typing out “ifconfig” (without the quotes) in a command window. If you’re using a windows system it’ll be different.
      Thanks for the question!

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน

      Those are wireless network cards. WLAN = wireless eth=Ethernet. Check out my hacker lab videos to copy my environment: th-cam.com/play/PL2IKcHBQPBdKI9fmq7py5RPhZ1kKm5dkD.html&si=jBRU7mRzT1wJEoew

  • @wibuiscutcho
    @wibuiscutcho 3 หลายเดือนก่อน

    ettercap not on win 10 ??

    • @pentest_TV
      @pentest_TV  3 หลายเดือนก่อน

      Not sure - I only use it on Linux.

  • @heshbola69
    @heshbola69 8 หลายเดือนก่อน +1

    anybody heard about encryption ?

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน +1

      100% an issue, but as I mentioned in the video it’s fairly rare to capture clear text authentication. But you’d be surprised how many unencrypted protocols are used within an enterprise on their internal network that this works against. My quickest win during an internal was when a Super Administrator connected to an ftp server re-using their windows SA credentials to connect. Less than 10 minutes after starting the internal and I already owned their network.
      SMB 2.0 and earlier are also clear text, and that’s still very much in the wild. Port 1433 SQL is also unencrypted. The list goes on.
      Thanks for watching and commenting!!

  • @KooLaidStudios
    @KooLaidStudios 4 หลายเดือนก่อน +1

    Well yeah it's http it's plaintext

    • @pentest_TV
      @pentest_TV  4 หลายเดือนก่อน

      True, but there are a number of plaintext protocols used extensively, especially found during internals including ftp smtp snmp telnet netbios and more.
      Internals is where this really shines and is always one of the first things I do during an engagement. People reuse their passwords all the time and I can’t count how many times admins use their AD username and password on cleartext protocols.
      Thanks for commenting and watching!

  • @BigBoss80452
    @BigBoss80452 8 หลายเดือนก่อน +1

    I'm new subscriber can you me to recover my Gmail 😭

    • @pentest_TV
      @pentest_TV  8 หลายเดือนก่อน

      Thanks for subscribing! Can’t help with the gmail account though.

  • @eminsavaylov7322
    @eminsavaylov7322 หลายเดือนก่อน +2

    https?😢😂

    • @pentest_TV
      @pentest_TV  หลายเดือนก่อน

      That’s a different type of attack and something I’ll cover soon - this is a layer-2 attack that’s best practice during an internal pentest.

    • @eminsavaylov7322
      @eminsavaylov7322 หลายเดือนก่อน +1

      @@pentest_TV I think https attack often face hsts problem, last time I focused on adware attack

    • @pentest_TV
      @pentest_TV  หลายเดือนก่อน

      100% agree. Hacking https during a pentest via mitm just isn’t worth the level of effort anymore.