Hands-On Penetration Testing on Windows
上QQ阅读APP看书,第一时间看更新

Advanced Ettercap – the man-in-the-middle Swiss Army Knife

In the previous chapter, we fooled around with ARP poisoning in Ettercap. I'm like every other normal person: I love a good ARP spoof. However, it's infamously noisyIt just screams, HEY! I'M A BAD GUY, SEND ME ALL THE DATA! Did you fire up Wireshark during the attack? Even Wireshark knows that something is wrong and warns the analyst "duplicate use detected!" It's the nature of the beast when we're convincing the network to send everything to a single interface – what is called unified sniffing.

Now, we're going to take man-in-the-middle to the next level with bridged sniffing, which is bridging together two interfaces on our Kali box and conducting our operations between the two interfaces. Those interfaces are local to us and bridged together, all on the fly, by Ettercap; in other words, a user won't see anything amiss. We aren't telling the network to do anything funky. If we can place ourselves in a privileged position between two endpoints pointing at an interface on either side of our host, the network will look normal to the endpoints. Back in my day, we had to manually set up the bridge to pull off this kind of thing, but now Ettercap is kind enough to take care of everything for us. 

The first (and obvious) question is, how do we place ourselves in such a position? There are many scenarios to consider and covering them would be beyond the scope of this book. For our purposes, we're going to set up a malicious access point, building on our Host AP Daemon knowledge from Chapter 1, Bypassing Network Access Control.