views:

111

answers:

2

Hi Guys,

Many of us must have done a Man-in-the-middle (MITM) attack on their internal networks- nothing serious, just for learning :)

Now there are a number of protocol vulnerabilities which make MITM possible - ARP Poison Routing, STP Claiming Root Role dual home, HSRP active router...

There are also a large number of network security analysis tools which can analyse a network for various such vulnerabilities.

Which would be your favorite method / tool to perform an MITM? And please narrate your most interesting / surprising / harrowing experience while performing a MITM.

A: 

As a joke, I once wrote an rlogin clone and implanted it in my friend's machine. The clone took his password, sent it to me by email and then did the normal job of rlogin. I then used the password for various pranks.

Perhaps not the classic 'man in the middle' attack, but it's related.

Eli Bendersky
+1  A: 

I usually ARP poison with Cain or etterCap (This is in windows, so you are pretty much limited to tools using WinPCap)

Anders