Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use

Bhargav Pingle, Aakif Mairaj, A. Javaid
{"title":"Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use","authors":"Bhargav Pingle, Aakif Mairaj, A. Javaid","doi":"10.1109/EIT.2018.8500082","DOIUrl":null,"url":null,"abstract":"Cybersecurity is becoming more significant with the increased reliance on the internet; and wireless networks like Bluetooth and Wi-Fi. There are many vulnerabilities in the cyber world which the attackers are exploiting. One such attack is Man-In-The-Middle (MITM) attack. Man-In-The-Middle (MITM) is one of the primary attacks employed in computer-based hacking. In this paper, we will discuss how the attacker performs the Man-in-the-middle (MITM) attack using the open source Ettercap tool in Kali Linux environment. Ettercap tool is a sniffing tool available in the Kali Linux operating system. It is used to perform sniffing, using Man-in-the-middle attack and other attacks like DDOS attack, packet filtering, DNS spoofing, etc. This paper attempts to implement this attack for instructional use in an academic setup for teaching a foundational cybersecurity course.","PeriodicalId":188414,"journal":{"name":"2018 IEEE International Conference on Electro/Information Technology (EIT)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on Electro/Information Technology (EIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT.2018.8500082","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15

Abstract

Cybersecurity is becoming more significant with the increased reliance on the internet; and wireless networks like Bluetooth and Wi-Fi. There are many vulnerabilities in the cyber world which the attackers are exploiting. One such attack is Man-In-The-Middle (MITM) attack. Man-In-The-Middle (MITM) is one of the primary attacks employed in computer-based hacking. In this paper, we will discuss how the attacker performs the Man-in-the-middle (MITM) attack using the open source Ettercap tool in Kali Linux environment. Ettercap tool is a sniffing tool available in the Kali Linux operating system. It is used to perform sniffing, using Man-in-the-middle attack and other attacks like DDOS attack, packet filtering, DNS spoofing, etc. This paper attempts to implement this attack for instructional use in an academic setup for teaching a foundational cybersecurity course.
使用开源教学工具实现真实世界的中间人(MITM)攻击
随着人们越来越依赖互联网,网络安全变得越来越重要;以及蓝牙和Wi-Fi等无线网络。网络世界中有许多漏洞被攻击者利用。其中一种攻击是中间人(MITM)攻击。中间人攻击(MITM)是基于计算机的黑客攻击的主要攻击之一。在本文中,我们将讨论攻击者如何在Kali Linux环境中使用开源Ettercap工具执行中间人(MITM)攻击。Ettercap工具是Kali Linux操作系统中可用的嗅探工具。它用于执行嗅探,使用中间人攻击和其他攻击,如DDOS攻击,包过滤,DNS欺骗等。本文试图在网络安全基础课程教学的学术设置中实现这种攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信