Sunday 12 January 2014

Network lan connection

 by mayur khokhar
Man in the Middle (MITM) AttacksFor some of you, MITM attacks may be a new concept so here is brief description. If a workstation is communicating with a server, and you are routing traffic between them, then you are the MITM. It’s a great position to be in for monitoring and manipulatingtraffic. There are lots of ways to acquire a MITM position using a range of protocol attacks. To get you started, I’veprovided a list of 10 protocols and tools for attacking systems on a LAN.-->> Address Resolution Protocol (ARP):Cain, ettercap, interceptor-ng,Subterfuge, easycreds-->> NetBIOS Name Service (NBNS): MetaSploit and responder-->> Link-local Multicast Name Resolution (LLMNR): MetaSploit and responder-->> Pre-Execution Environment (PXE): MetaSploit-->> Dynamic Trunking Protocol (DTP): Yersinia-->>Spanning-Tree Protocol (STP): Yersinia, ettercap (lamia plugin)-->> Hot Stand-by Router Protocol (HSRP): Yersinia-->> Dynamic Host Configuration Protocol (DHCP): Interceptor, MetaSploit, manual setup-->> Domain Name Services (DNS): MetaSploit, ettercap, dsniff, zodiac, ADMIdPack-->> VLAN Tunneling Protocol (VTP): Yersinia, voiphopper, or modprobe+ifconfig

0 comments:

Post a Comment

***For free Breaking News Alerts just sms JOIN NAXATRANEWS to 567678********For free Adult Jokes just sms JOIN 18JOKES to 567678*****