Processing the data

You will now have a large text or html file on your desktop, these are your results, don't open them just yet. If you have a slow computer with a low amount of RAM don't leave your MITM attack running for too long or you could generate a text file too large for your computer to handle!

Now close down your two terminals and open the text file in your favorite editor. 

ow the fun bit! Search the document for the following:

password=

password

pass=

pass

username=

username

user=

user

email...

Be creative and think for others. Bascially keep searching through the document until you come across "username=XXXXX, password="****" then look above for the website they were on and voila you have acquired a login!

This attack also works for wired connections, to do this you need to change the interface you use to the interface that is connected to the wired network

 

<< Prev | Next >>

Home | Notes Catalog | Privacy & Terms | About us | Contact us | Site map |     Copyright © Notesbin.com 2016.                                     Template by WebThemez.com