Packet Sniffing on Network

 This Practical is For Educational Purpose only.
 

What is Packet Sniffing ?

--> Packet sniffing is the practice of gathering, collecting, and logging some or all packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet, or a defined subset of packets, may be gathered for further analysis. You as a network administrators can use the collected data for a wide variety of purposes like monitoring bandwidth and traffic.

How This Works?

--> A packet sniffer, sometimes called a packet analyzer, is composed of two main parts. First, a network adapter that connects the sniffer to the existing network. Second, software that provides a way to log, see, or analyze the data collected by the device.

 Requirements :-

1. Kali Linux OS

2. Ettercap(Pre-installed on Kali)

3.Wireshark(Pre-installed on Kali)

-----------------------------------------------Lets Start--------------------------------------------

Step 1:- First Of all connect Kali Linux to the network in which victim was connected.(Victims WIFI network)

Step 2:- Start Ettercap(GUI version) on Kali.

Step 3:- Turn on Sniffing at startup option, And select your interface from below option.(As per your connection type interface may vary).Then Click accept.


Step 4:- wait until the message started unified sniffing message shown below.


Step 5:- Make sure your Victim is in the network, to do that we had to scan the whole network.(Follow the below screenshots)



Step 6:- Now the all the devices Connected to your network will be displayed.

Step 7:- To identify Your victim you can perform OS detection Scan through nmap on the following ip's.

Step 8:- I performed the map scans and I come to know That my Victim ip is 192.168.0.102 and the router ip was 192,168.0.1 . Now I will add my victim to the Target 1 and router to the target to to perform ARP poisoning attack.

Step 9:- After adding both the target Start the ARP poisoning from the MITM menu boxed press OK.


Step 10:- After pressing OK the attack was started and Now you can monitor all the packets between your victim and router.(you can see the process in the below output box on the page of Ettercap).

Step 11:- To watch the Packets you need to open Wireshark on Kali.

Step 12:- After Opening Wireshark click your network interface.

Step 13:- You can see there are many packets shown here. We want packets of our victim only so we need to filter the list.
to filter paste this on your Wireshark(use your victim ip instead of this)
ip.addr == 192.168.0.102


Step 14:- Now we will open Facebook.com on our victim device and check the packets are displayed here or not

Step 15:- Packet display that Victim is requesting for Facebook.com


That's It we have Successfully Sniffed the packets and also performed the ARP Poisoning Attack,
For more like this stay Connected.

JAYRAJSINH CHAUHAN...

Comments