Network Sniffing
◾
161
Since we are able to manipulate the gateway, we can point the victim’s gateway to a non-existing IP
address and hence cause a Denial of Service attack. In cases where we want to sniff the traffic, we
can launch a DHCP spoofing attack, where by we would change the default gateway of the victim
to our address and hence be able to intercept all the traffic that the victim sends.
From the MITM menu, we will select DHCP spoofing. You would now need to insert the
address of IP pool, netmask, and the IP address of your DNS server.
IP Pool - This step is optional, as in case you don’t provide an IP pool it would get the IP from
the current DHCP server.
Netmask - In most of the cases it is 255.255.255.0, however it might be different in your case.
DNS Server - Finally the IP address of your DNS server (Default gateway).
Next click “OK” to start the attack. Next on the victim’s machine we would use the following
command to release the current DHCP lease.
Dostları ilə paylaş: