ARP-SPOOFING

In this article we will see how to obtain credentials in cleartext, through an arp spoofing attack

INE-LAB

All tests in this article will be performed at the INE free lab.

ARP

E

Image Src: Fortinet

The address resolution protocol (ARP) is a data link layer communications protocol responsible for finding the (MAC) hardware address that corresponds to a given IP address. This is done by sending an (ARP request) packet to the network broadcast address (broadcast, MAC = FF FF FF FF FF FF FF FF FF FF FF FF FF) containing the IP address being queried, and waiting for that (or another) machine to reply (ARP reply) with the Ethernet address that corresponds to it.

ARP-SPOOF

(MitM) Usually the purpose is to associate the attacker’s MAC address with the IP address of another node (the attacked node), such as the default gateway. Any traffic directed to that node’s IP address will be mistakenly sent to the attacker, rather than to its actual destination.

To execute this attack i am going to use my ArpSpoofing-Auto tool writen in bash, which automates the sniffing process with the ArpSpoof and tshark tools, to give you a .pcap file to analyze with wireshark.

  • Identify the telnet server and the client machine

  • Intercept traffic between the two

  • Analyze the traffic and steal valid credentials

Telnet

  • 10.100.13.37 server, 10.100.13.36 client

Arp-Spoofing Tool


wget https://raw.githubusercontent.com/HI0U/ArpSpoofing-Auto/main/Auto-arp.sh


chmod +x Auto-arp.sh


./Auto-arp.sh

Test

Once we get that capture, you can analyze it in wireshark to get the credentials and connect to the server via telnet.

ARP