Quote:
Originally posted by atul_mehrotra
hii people ....
Can any body help me in creating "Man in the middle attack " on unix platform....
i m interested in complete algo & explanation of each and every aspect of how to create such attack....
bye....
|
There is no algorithm for "man in the middle" attack, since it's just
a principle, a design. Meaning: You have one (or a multitude of) sender and
one (or a multitude of) which are communication by whatever means, and
"man in the middle" is connecting inbetween them by opening up their
means of communication and listening on what is exchanged through it.
If you have access to sender or receiver, you might develop a software
layer which hooks into their communication and makes it visible and there-
fore readable to you.
If you don't, then you will need a third machine which is connected to the
same network. You will have to switch the connected network adapter
to promiscous mode, which will make it read anything that is sent through
your network, and well, read it and take the appropriate steps.
Ethereal for example is working this way.