This repository demonstrates a Man-in-the-Middle (MITM) attack using ARP poisoning and Wireshark to capture HTTP credentials in a controlled environment. It's a great way to learn how attackers can intercept network traffic and potentially steal sensitive information. 🚨
- Kali Linux 🐧
- Wireshark 🔍
- Ettercap 💻
- Kali Linux as the attacker.
- Windows VM as the victim.
- Install Ettercap: For performing ARP poisoning and intercepting network traffic.
- Install Wireshark: For capturing and analyzing packets.
- Start Ettercap and run ARP poisoning on the victim (Windows VM).
- Ensure that the attacker (Kali) is in between the victim and the target (router) for successful interception.
- Launch Wireshark and start capturing network packets.
- Filter for HTTP requests using
http.request.method == "POST"
or filter by IP to analyze the traffic.
Ettercap.conf
: Configuration file for ARP poisoning.Wireshark.pcap
: Captured network packets during the MITM attack.
This project is licensed under the MIT License. Feel free to use and modify it!
- How ARP poisoning works in a local network.
- How attackers can sniff sensitive information like login credentials.
- How to use tools like Ettercap and Wireshark to perform MITM attacks.
This project is for ethical hacking practice only. Always use it in a controlled environment and with permission. Misuse of this technique can lead to serious consequences. Use responsibly.
- Feel free to raise issues or questions related to this repo. I am happy to help!