• Complain

Unknown - Hacking of Computer Networks.

Here you can read online Unknown - Hacking of Computer Networks. full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Dr. Hidaia Mahmood Alassouli, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Hacking of Computer Networks.
  • Author:
  • Publisher:
    Dr. Hidaia Mahmood Alassouli
  • Genre:
  • Year:
    2021
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Hacking of Computer Networks.: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Hacking of Computer Networks." wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Unknown: author's other books


Who wrote Hacking of Computer Networks.? Find out the surname, the name of the author of the book and a list of all author's works by series.

Hacking of Computer Networks. — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Hacking of Computer Networks." online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Hacking of Computer Networks Part 7 Sniffer and Phishing Hacking Part of - photo 1
Hacking of Computer Networks
Part 7: Sniffer and Phishing Hacking
Part of Certified Ethical Hacker (CEH) Course
By
Dr. Hidaia Mahmood Alassouli
Hidaia_alassouli@hotmail.com
Part 7: Sniffer and Phishing Hacking
a. Understanding Sniffer
b Understanding ARP Poisoning ARP poisoning is changing the mac address - photo 2
b Understanding ARP Poisoning ARP poisoning is changing the mac address - photo 3
b. Understanding ARP Poisoning
ARP poisoning is changing the mac address of the the gateway in the router to - photo 4
ARP poisoning is changing the mac address of the the gateway in the router to be the hacker mac address. The command for arp spoofing
Arp I eth0 -i (ip of the target) -t (ip of the gateway)
c Man of the Middle Attack Using Ettercap in Command Line Enable - photo 5
c. Man of the Middle Attack Using Ettercap in Command Line:
Enable the Ip forward using the command echo gt - photo 6
Enable the Ip forward using the command echo gt - photo 7
Enable the Ip forward using the command
# echo > /proc/sys/net/ip4/ip_forward
Do arp poisoning
# arpspoof I eth0 t 192.168.52.132(target ip) 192.168.52.2 (gateway ip)
Edit the ip table to tell the computer that any traffic that will come in port - photo 8
Edit the ip table to tell the computer that any traffic that will come in port must be forwarded to port 10000. Then edit etter.conf to tell him the edit in the ip table by removing the hash # from the redirect commands.
Then activate the ssl tools in pentest cd pentestwebsslstrip python - photo 9
Then activate the ssl tools in pentest cd pentestwebsslstrip python - photo 10
Then activate the ssl tools in pentest
#cd /pentest/web/sslstrip
#python sslstrip.py -a (put the port if 10000 not default)
Display the results using the ettercap tool
# ettercap T -q -I eth0
Test the connection from target computer and you will get the username and password.
d Man of the Middle Attack Using Ettercap in Graphical Interface Repeat - photo 11
d. Man of the Middle Attack Using Ettercap in Graphical Interface:
Repeat the steps for ip forward and iptables and sslstrips
# echo > /proc/sys/net/ip4/ip_forward
# arpspoof I eth0 t 192.168.52.132(target ip) 192.168.52.2 (gateway ip)
#cd /pentest/web/sslstrip
#python sslstrip.py -a (put the port if 10000 not default)
Open the ettercap. Choose sniff, unified sniffing, eth0, scan for hosts, hosts list. Then ARP poisoning, poison one way. Then start sniffing.
You can also use the windows version Cain and abel. You can also use yamas tool.
e. DHCP Starvation Attack:
In DHCP starvation the hacker will stop the DHCP server The hacker will make - photo 12
In DHCP starvation, the hacker will stop the DHCP server. The hacker will make in his computer DHCP server. If the client wants IP, the hacker computer will provide him with the Ip but the gateway will be the Ip of the hacker machine and the hacker will open Ip forward to connect to internet. The hacker will have sniffing program. When the clients want to go to internet, they will send the hacker computer the data. The data will come through the hacker computer and the hacker will forward them to internet. The sniffing program will show the user name and password of the client.
DHCP Starvation attack technique:
We have to install the DHCP server on the hacker computer Then we make - photo 13
We have to install the DHCP server on the hacker computer. Then we make configuration for the scope it will distribute. We have to tell him to put in the gateway the ip of the hacker machine. Then we have to install and configure the tool Dhcpstarv. The tool can make DHCP attack and can stop the DHCP server. Then we make the steps for the sniffing techniques. When the computer writes any username and password we can see them in ettercap.
Install the DHCP server using the command
# apt-get install dhcp3-server
#kate /etc/dhcp/dhcpd.conf
Change the scope and put the ip of gateway router to be the hacker computer
Start the dhcp server by typing dhcp isc-dhcp-server start Download the - photo 14
Start the dhcp server by typing
# dhcp isc-dhcp-server start
Download the tool DHCP starvation to stop the dhcp server in the network
This is the DHCP server in the windows with its scope The gateway - photo 15
This is the DHCP server in the windows with its scope
The gateway To stop the network dhcp server go to the tool dhcpstarv - photo 16
The gateway
To stop the network dhcp server go to the tool dhcpstarv dhcpstarv I eth0 - photo 17
To stop the network dhcp server, go to the tool dhcpstarv
# dhcpstarv I eth0
It will reserve all the ips in the scope of the network dhcp server We - photo 18
It will reserve all the ips in the scope of the network dhcp server
We will enable the ip forward in the hacker machine and we make the settings of - photo 19
We will enable the ip forward in the hacker machine and we make the settings of the iptable . Then we run the sslstrip
We run the ettercap to show the username and password Test the - photo 20
We run the ettercap to show the username and password.
Test the connection Use any computer to the network to login yahoo In the - photo 21
Test the connection. Use any computer to the network to login yahoo. In the hacker computer we can get the username and password.
f Understand MAC Spoofing The MAC address The MAC address consists - photo 22
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Hacking of Computer Networks.»

Look at similar books to Hacking of Computer Networks.. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Hacking of Computer Networks.»

Discussion, reviews of the book Hacking of Computer Networks. and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.