Posts Tagged ‘MITM’

MITMf – Framework for Man-In-The-Middle attacks

MITMF is another framework that can be used for man-in-the-middle attack. the tool is python based and have several plugins that adds more functionality during a penetration test. some of useful plugins are: jskeylogger – this plugin injects a javascript keylogger into clients webpages to have all victim keystrokes on the webpage. JavaPwn – Performs [...]

Share

Responder- MITM and Network Spoofing Tool

Responder is a tool from SpiderLabs that can be used during a pentest for spoofing and network man-in-the-middle attacks. Initially the utility comes to spoof special network protocols for resolving hostnames such as NBNS which is similar to DNS service. Now responder can be used against many advanced protocols including DNS , ICMP redirect ,SMB [...]

Share

MITMER- MITM Testing Tool

Securing the traffic in your network is important to prevent MITM attack that can be used to sniff sensitive information on your network. Some users may require to open sensitive portals of the office to make their work remotely without verifying the security of the network used. if you need to use non trusted network [...]

Share

Subterfuge Automated Man-in-the-Middle Attack Framework

Subterfuge is a python based tool that you can use for testing Man-In-The-Middle attacks. the program will start to sniff network traffic and wait to have user login to online websites such as gmail , twitter, facebook and more.  Next it will display accounts information. Beside the session hijacking module there are other modules that [...]

Share

Hacking Approach to VoIP & Skype

Skype certainly provides a very nice way for voice communication and chat, but questions remains: Is the system is secure and reliable? Can outsiders capture the conversation or intercept data? To answer these questions, we will be searching different previous ways demonstrated by security researchers to hack Skype. Intercepting data on VoIP systems is no [...]

Share

Sniffing/MITM Attacks on Tor network

Tor is wonderful tool to ensure your privacy on the Internet ,Tor software is a program that you can run on your computer to helps keep you safe on the Internet.Tor prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. [...]

Share

SSLSniff: How it works?

Using emails, control panel, electronic banking system all these operations and others should be fully secure and protected. If all data are transmitted over a secure SSL connection many people think that it is fairly secure. But the question is that true? The answer is yes but not 100%. To transmit data like login and [...]

Share