Use ettercap to run an ARP poisoning attack, and install and run Shijack to demonstrate hijacking a Telnet session.
While much of the internet runs through web sessions,…some of the earlier internet protocols…which run directly on TCP and UDP…are of significant interest to attackers.…It's useful therefore to understand…how these protocols can be hijacked at a network level.…One of the tools we can use to do TCP session hijacking…is Shijack, shown here at the Packet Storm Security site.…I've already downloaded and unzipped this tool…so let's get started and look at how we might hijack…a telnet session.…
I'll run this attack from Kali…so I've got a terminal open, ready to go.…The first thing I need to do is poison the local network.…I could do that on a command line…using the ARP spoof tool,…but I quite like the Ettercap graphical utility.…I'll start up Ettercap using the minus g switch…to run it in graphical mode.…Ettercap starts up and we can see the main screen.…I'll select sniff and unified sniffing,…and I'll accept etx0.…
I'll now select hosts and scan for hosts.…Okay, we've got a list of hosts…and my two telnet conversation lists are there.…
This course teaches you what session hijacking is, and how black-hat hackers use it to attack an organization. Learn how TCP, web, and wireless protocols work and how hackers exploit them. Find out how to use built-in Windows and Linux tools, as well as specialized third-party solutions such as Zed Attack Proxy (ZAP) and Cain, to detect and shore up vulnerabilities. Author and cybersecurity expert Malcolm Shore also discusses remote hijacking, which allows hackers to take control of drones or even vehicles.
Note: This course maps to the Session Hijacking domain of the Certified Ethical Hacking exam. Review the exam objectives at the EC-Council's website.
- Hijacking a network session, such as a Telnet session
- Understand web sessions
- Intercepting sessions via man-in-the-middle or man-in-the-browser attacks
- Downgrading a session by stripping SSL
- Using ARP poisoning through Subterfuge
- Hijacking an HTTP session through cookies
- Using hijacking defense tools: Zed Attack Proxy and Cain
- Service hijacking (DNS and SSH)
- Hijacking in the physical world: cars and drones