2.1 Man in the Middle Hijack Part 1

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

1 hour 18 minutes
Video Transcription
Hey, everyone, welcome back to the course. So in the last module, we wrapped up our discussion on session hijacking. So we learned about what session hijacking actually is. And we also learned about different types of attacks. We could do that fall under that umbrella of session. Hi, Jackie.
Now, in this video, we're gonna go ahead and use a tool called Enter Captain Sonic Callie linen. So we're basically gonna be performing a man in the middle attack, and we're gonna be sniffing the session between two different devices and then capturing the log in credentials. Now, of course, we're gonna know all that information because we're the ones actually entering the stuff. But this is just show you a simulation of what it could look like if an attacker
is sniffing in on your session.
So let's go ahead and get started. So you will be the cyber lab environment for this when you could also set it up on your own machines, how we're not gonna cover that set up in this particular lab.
So just make sure you locked in the cyber website, which you should be. If you're watching this video and you could either search for a certified ethical hacker or to search for C E. H. And I'm kind of lazy today. So I'm gonna search for C E. H. And you'll see it'll pull up. The lab said I want So it's a certified ethical hacker ch in parentheses and it's by practice laps. So just go and click on that.
You'll see a launch button right there. Just click on that as well,
and we'll see what more. But we need to click a launch fightem button there that's gonna launch the lab environment in a separate tab for us.
Now, once the lab environment launches, you're gonna see a lot of different labs in there. We're gonna scroll down the page just a little bit, the one we're looking for us. It's implementing network level session hijacking. So this one right here, it's about halfway down or so on the page.
Once you find that, go ahead and click on it and then just click on the start button right here that's gonna actually pull up the lab force.
Now we need to go ahead and launch our virtual machines. You see that by default, it usually starts up your server one, but the other devices that doesn't start up automatically. So we just want to hover are mouse over top of the name there, and then just click the power on option.
And same thing for that one there. Now it takes, you know, about 30 seconds or so to booth ease up, Simon. A pause, a video briefly, and we'll come back to it once All of mine are booted up.
All right, so you see that all of my virtual machines air now started up. If yours are not, then go ahead. Plus a video again. It just waiting to your machines Come online again. It doesn't take too long. It's usually about 30 seconds or so with this particular lab s so pretty quick that it boots up for you.
And, you know, they're all booted up by the it saying on. And then, of course, the green on button right there.
All right, so let's get back to our lab document here. So
we're gonna see where we need to go from here. Now we're gonna I should be connected to our server machine, which I'm already connected to their but she'll see here and step for. That's what we're doing next. So we're just gonna click on the P Lab s a 01 a lot of times by default to put you right in that machine. Sometimes they put you on the Cali one. So you may just need to click on this one here.
You're going to see, As I mentioned, a Step five, the server management windows actually open there in the background, as you see,
and we're to go ahead and close that out. We don't need that for this particular lab.
The next thing we're gonna do is actually click on this exam icon to this orange colored icon with an X in the center at the bottom. Here,
we're gonna go ahead and click on that.
And while this watching up there, what is going to do is launch Apache Web service is for us. It's gonna enable that. So you'll see here in step seven. I mentioned that
we're gonna let that launch for us here and one additional step that I don't have the step by step guide. I just like to kind of talk it. It's an optional step, like you stopped through it I always like to click the these couple of start buttons right here for Faisal. A file, a zeal. Excuse me and Mercury.
Um, I found that, for some reason, that helps the lab actually not crash on you.
Um, it doesn't make any sense in my opinion of why that works or not. But, uh, I was just click. Those is kind of a matter of habit and for some reason that that seems to let me do these labs without a whole lot of issues.
All right, so once you've done that, they're the next thing we're gonna do is actually click to our Windows 10 machine. You'll see that here in step number eight. So let's go ahead and click on that now.
So, do you have your mouse over top and click on the name right there?
It's gonna take a second or so to initialize here. Probably about five or 10 seconds to initialize the machine. You'll see a little splash of a command prompt window in the background. There is just a script running. And once that's done, then we'll kind of move forward with our lap here. So let's go back to our step by step guy. We're gonna be cooking on that DNC viewer icon in just a second
and you notice that little splash in the background there. Now that's one away. So we'll move forward with our lab.
So here in step nine were to double click on the V NC viewer icon on the desktop. That's his orange colored one. Almost looks like a little tiger's eye.
I just double click on that to open it up.
You're gonna see the Cali Lennox desktop I P address in there. So by default populates that for you. And I know that's to correct one. Just because I've done this a lap so many times s Oh, that's a correct I P address in there and by default should populate that in there for you.
Once you see that in there just clicked on the connect button and then we're gonna enter in our password.
So we go back to our lab document here. You're going to see our password is actually just the word password, but it's gonna have a capital P. And that's the number zero and not a capital O. So capital P lower case A. S s W the number zero and the lower case R D. So let's go ahead and take that in. So capital P
lower case K A S s W the number zero lower case R and R. Lower case indeed. Get a hit. Enter into keyboard is quick. The okay button that's gonna launch the Cali machine for us. When it launches, you'll see Very, we have an heir message.
Don't worry about that. You could deceive or click the okay button or just X out of it. Whatever your preference is, we don't care about that particular error for this lab that we're doing.
So let's go back to our step by step guide here. We're gonna be basically launching a terminal window next,
so you'll see here. Step toward a strong Excuse me. Step 12. I just mentioned that the Keller machine is gonna open up for us. We're gonna double click on the Route Terminal icon and that's gonna launch the terminal window. And then we're just gonna type in this command right here to launch the other cap tools. Let's go and do that now. So just double click on the route terminal that will open up a terminal prop for us, and then just type that ever cap
all over. Case space, dash capital G.
Just like that. This press enter into keyboard 2nd 2nd or so, But you see it launched the other cap tool for you.
I'm just gonna move this up just a little bit, so it's easier to see.
Let's go back to our lab document.
All right, so we've completed step 14 there. So now we're gonna go ahead and were to jump down two steps. 17. The rest of this is just kind of mentioning some things that we're doing here.
Steps 17 we're gonna select sniffed at the top. So it's that section second option, and then we're gonna select unified sniffing.
And what we want to do is we want to look to make sure that the default Theo E th zero the Ethernet zero interface is selected. It should be by default. So we're probably going to be selecting OK there, But we just want to double check it before we get started.
So what is going to say sniff here? What's left suit, and then unified sniffing that top option there.
You'll see her to give us his papa box. You'll see it by default. It has t th zero, at least on my end. And it should look the same on your end as well. So we're just gonna say Okay right there.
Let's go back to our lab document here.
So now we're gonna go ahead, basically scan for host. Now we're gonna click the host option and then scan for hosts at the very top.
So let's go and do that now. So quick, host. And then we'll choose the vory the top part here. Scan for hosts.
See? It's going to start scanning there, down at the bottom of the window. We see that it's going ahead in scanning. Now it's gonna whatever it finds its gonna add those host to our host list for everyone. We should all have the same thing. That should add three host for you.
So you'll see here. I mentioned that a step 20 that you'll see the identified host again. That's so those three host that we have.
All right, so no one step 23 we're gonna go back to the host option here, and we're gonna select host list, and that's gonna list out the host for us.
So let's go and do that. Now we're gonna click on host,
and then she was a very top option there. The host list.
You see, it's gonna list out the different host for us so we can get those I p addresses there. Now, we've already gotten those on the step by step instructions. You don't worry about that there. But these are our couple of machines right here that we're gonna be using for this particular lab. So that is one in a shoot out. 168.0, Not one and 102.168 dot 0.4.
All right, I'm gonna go ahead and pause the video there before we move on to the next step. Will pick things back up in the next video.
Up Next
Session Hijacking

This course covers session hijacking, which is where an attacker takes over a legitimately established session between a user and host. This is normally seen between a user and a Web server, but it could occur with a Telnet session or other TCP-based connection.

Instructed By