LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > Programming
User Name
Password
Programming This forum is for all programming questions.
The question does not have to be directly related to Linux and any language is fair game.

Notices


Closed Thread
  Search this Thread
Old 09-22-2004, 04:25 AM   #1
atul_mehrotra
LQ Newbie
 
Registered: Sep 2004
Posts: 28

Rep: Reputation: 15
man in the middle attack


hii people ....
Can any body help me in creating "Man in the middle attack " on unix platform....
i m interested in complete algo & explanation of each and every aspect of how to create such attack....
bye....
 
Old 09-22-2004, 04:34 AM   #2
AAnarchYY
Member
 
Registered: Sep 2004
Location: Carlisle, MA
Distribution: Debian 8
Posts: 419

Rep: Reputation: 31
heh, think you can elaborate a little on this?
 
Old 09-22-2004, 04:39 AM   #3
atul_mehrotra
LQ Newbie
 
Registered: Sep 2004
Posts: 28

Original Poster
Rep: Reputation: 15
hii..
this is a sort of attack made on networks where a particular machine starts acting as a middle man n every request to the server is passed thru this machine..
it is a sort of spying activity...here v can trap the information passed to the server if i m the middle man..
 
Old 09-22-2004, 04:44 AM   #4
AAnarchYY
Member
 
Registered: Sep 2004
Location: Carlisle, MA
Distribution: Debian 8
Posts: 419

Rep: Reputation: 31
sounds like your looking for arp poisoning, ettercap does that

hopes he made the right descision
 
Old 09-22-2004, 04:49 AM   #5
atul_mehrotra
LQ Newbie
 
Registered: Sep 2004
Posts: 28

Original Poster
Rep: Reputation: 15
thanx for immidiate reply man..
but i can u explain a bit abt ettercap....
i wanna know that how can i use it as in my lan i had server which has this version of LINUX...
"Red Hat Linux release 8.0 (Psyche)
Kernel 2.4.18-14smp on an i686"
 
Old 09-22-2004, 04:51 AM   #6
AAnarchYY
Member
 
Registered: Sep 2004
Location: Carlisle, MA
Distribution: Debian 8
Posts: 419

Rep: Reputation: 31
well open it up and tinker around in it first, thats how i learned it, and i dont know how the newer version works because i dont use it(they changed the ncurses display and it sucks now, and the gtk one crashes too much and is a pain to work with)
 
Old 09-22-2004, 04:54 AM   #7
atul_mehrotra
LQ Newbie
 
Registered: Sep 2004
Posts: 28

Original Poster
Rep: Reputation: 15
hey just tell me does it requires permissions of "super user" to use it
 
Old 09-22-2004, 04:57 AM   #8
AAnarchYY
Member
 
Registered: Sep 2004
Location: Carlisle, MA
Distribution: Debian 8
Posts: 419

Rep: Reputation: 31
Certianly does.
 
Old 09-22-2004, 05:03 AM   #9
atul_mehrotra
LQ Newbie
 
Registered: Sep 2004
Posts: 28

Original Poster
Rep: Reputation: 15
Sorry man i dont have superuser permission of the said server...
can i still use ettercap....
 
Old 09-22-2004, 05:09 AM   #10
AAnarchYY
Member
 
Registered: Sep 2004
Location: Carlisle, MA
Distribution: Debian 8
Posts: 419

Rep: Reputation: 31
No, you can't. Not unless your network administrator gives you raw access to opening/closing/spoofing ports.
 
Old 09-22-2004, 08:32 AM   #11
Marius2
Member
 
Registered: Jan 2004
Location: Munich
Distribution: SuSE 9.2, 10.2, 10.3, knoppix
Posts: 276

Rep: Reputation: 31
Re: man in the middle attack

Quote:
Originally posted by atul_mehrotra
hii people ....
Can any body help me in creating "Man in the middle attack " on unix platform....
i m interested in complete algo & explanation of each and every aspect of how to create such attack....
bye....
There is no algorithm for "man in the middle" attack, since it's just
a principle, a design. Meaning: You have one (or a multitude of) sender and
one (or a multitude of) which are communication by whatever means, and
"man in the middle" is connecting inbetween them by opening up their
means of communication and listening on what is exchanged through it.
If you have access to sender or receiver, you might develop a software
layer which hooks into their communication and makes it visible and there-
fore readable to you.
If you don't, then you will need a third machine which is connected to the
same network. You will have to switch the connected network adapter
to promiscous mode, which will make it read anything that is sent through
your network, and well, read it and take the appropriate steps.
Ethereal for example is working this way.
 
Old 09-22-2004, 10:52 AM   #12
XavierP
Moderator
 
Registered: Nov 2002
Location: Kent, England
Distribution: Debian Testing
Posts: 19,192
Blog Entries: 4

Rep: Reputation: 476Reputation: 476Reputation: 476Reputation: 476Reputation: 476
Could you clarify, please. You are a user on a network, the network admin doesn't know you or doesn't want to give you superuser access and you want to know how to attack a server on your network. Hmm, when you look at it that way, it appears that you want to attack the network. Maybe that's why you don't have root on the network?

Or am I reading you wrong? Take a look at the Rules of LQ - it looks as though you want us to help you break at least one of them.
 
Old 09-22-2004, 11:48 AM   #13
crabboy
Senior Member
 
Registered: Feb 2001
Location: Atlanta, GA
Distribution: Slackware
Posts: 1,821

Rep: Reputation: 121Reputation: 121
LQ is not a full disclosure site and will not be used to share/discuss exploits to linux or any other systems.

http://www.linuxquestions.org/rules.php

Closing thread.
 
  


Closed Thread


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
ssh man-in-the-middle naomi Linux - Security 2 05-19-2005 02:04 PM
man alsamixer not showing the man page nosaku Slackware 1 12-20-2004 08:52 AM
man in the middle attack atul_mehrotra Linux - Security 4 09-22-2004 09:02 AM
Man in the middle attack juanb Linux - Security 17 03-29-2004 01:03 PM
Compiling packages on RH 7.1 causes man files to be named man.gz mmboam Linux - General 0 05-09-2001 06:47 PM

LinuxQuestions.org > Forums > Non-*NIX Forums > Programming

All times are GMT -5. The time now is 11:23 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration