From: Sebastian Garcia (sgarcia@cybsec.com)
Date: Thu May 22 2003 - 17:50:35 EDT
Pete, under linux you can use "Hunt" too, it can do a lot of things, ie.
connection hijacking, arp poisoning, *lot* of sniffing, etc...
It doesn't support ssl or ssh.....yet.
You can find it here..
http://lin.fsid.cvut.cz/~kra/index.html
http://freshmeat.net/projects/hunt/
>From the site:
"The main goal of the HUNT project is to develop tool for exploiting
well known weaknesses in the TCP/IP protocol suite. I tried to implement
some "new" features which I didn't see in any free product. (connection
synchronization after attack, ARP relayer, ...)"
sebas
On Thu, 2003-05-22 at 14:20, n0brain wrote:
Pete,
there is a linux based program like the C&A, his name is ettercap.
http://ettercap.sourceforge.ne <<< this is the link
reggards,
n0br4|n
On Wed, 2003-05-21 at 16:26, Pete Jacob wrote:
> David,
>
> thanks! I ran both Iris and Ethereal, and the data really is
> encrypted... there is a section in C&A that show the faked SSL certs...
> with all the session info. I guess all my switches are susceptible to
> ARP attacks.
> looks like it did a "man in the middle"... this program is soo evil, yet
> so powerful.
>
>
> C&A is very sweet... I wish it were Linux based.
>
> thanks again.
>
> Pete.
>
> On Wed, 2003-05-21 at 14:15, Cushing, David wrote:
> > Pete,
> >
> > What you are seeing is the result of a "man in the middle" style attack rather than a decoding of your SSL connection to the bank.
> >
> > C&A is intercepting and forwarding your traffic due to the ARP poisoning. Your browser negotiates an SSL connection with C&A. C&A negotiates another SSL connection to the bank. Then C&A is able to see all traffic in plaintext as it passes it along.
> >
> > Browser <--ssl--> C&A (plaintext) <--ssl--> Bank
> >
> > The program is not able to generate a proper certificate to hand your browser, though. It is self signed and will not be trusted by your browser. An alert should have popped up when you opened the page. Did it?
> >
> > Cain info: http://www.oxid.it/cain_faq.html
> > MiM info: http://www.sans.org/rr/threats/man_in_the_middle.php
> > --
> > David
> >
> > > -----Original Message-----
> > > I was reading thru the list and decided to give Cain & Abel a try...
> > > it is a really powerful tool, I do have a question, I was running it
> > > using the ARP poisoning from one of my test machines to my internet
> > > gateway.. (Cisco 3600 series) I logged into my On-line
> > > banking account,
> > > which is an SSL connection, and Cain & Abel picked up my username and
> > > passsword as "Clear text"... I guess I am confused about this...
> > > when I goto the site, it is an SSL site,it appears that the entire
> > > session is SSL, and Cain & Abel is not doing any sort of
> > > "Cracking" and
> > > if the software "Cain & Abel" is doing
> > > some sort of sniffing, wouldn't it be encrypted via SSL?
>
>
> ---------------------------------------------------------------------------
> *** Wireless LAN Policies for Security & Management - NEW White Paper ***
> Just like wired networks, wireless LANs require network security policies
> that are enforced to protect WLANs from known vulnerabilities and threats.
> Learn to design, implement and enforce WLAN security policies to lockdown enterprise WLANs.
>
> To get your FREE white paper visit us at:
> http://www.securityfocus.com/AirDefense-pen-test
> ----------------------------------------------------------------------------
>
---------------------------------------------------------------------------
*** Wireless LAN Policies for Security & Management - NEW White Paper ***
Just like wired networks, wireless LANs require network security policies
that are enforced to protect WLANs from known vulnerabilities and threats.
Learn to design, implement and enforce WLAN security policies to lockdown enterprise WLANs.
To get your FREE white paper visit us at:
http://www.securityfocus.com/AirDefense-pen-test
----------------------------------------------------------------------------
---------------------------------------------------------------------------
*** Wireless LAN Policies for Security & Management - NEW White Paper ***
Just like wired networks, wireless LANs require network security policies
that are enforced to protect WLANs from known vulnerabilities and threats.
Learn to design, implement and enforce WLAN security policies to lockdown enterprise WLANs.
To get your FREE white paper visit us at:
http://www.securityfocus.com/AirDefense-pen-test
----------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:33 EDT