How to do MITM Attack ( Man in the Middle) ?

Is article mai hum apko MITM Attack ke bare mai bata rahe hai. Jaise What is MITM Attack. How to do Man in the Middle attack. Apko iske bare mai practically btaya ja raha hai.

MITM Attack ke bare mai apko pahle bhi btaya gaya hai. Apko Facebook Hacking ke article mai iski theory btayi gayi thi. Yaha hum apko yeh sab practical bata rahe hai.

Yeh sab apko educational purpose ke liye btaya ja raha hai. Aap inka miss use kabhi mat karen. MITM Attack same network mai work karta hai. Lekin Hackers Wifi hack karke Network mai enter hokar bhi iska use karte hai.

Note- This article is only for educational purpose. Don’t miss use your knowledge and skills.

What is MITM Attack ?

Jaise ki naam se hi pata chalta hai Man in the Middle attack. MITM attack mai hacker kisi process ke bich mai apna connection bna leta hai. Yeh attack ka use bahut tarah se kiya jata hai.

Hackers MITM Attack ki help se apne target ki information ko capture karte hai. Jaise user apne device par kya kar raha hai, User ke device mai remotely keylogger use kiya ja sakta hai.

MITM Attack ki help se user ke device ki bahut sari information nikali ja sakti hai. User ke device mai kisi tarah ki script ko bhi run karvaya ja sakta hai.

User ke browser mai hijacking bhi ki ja sakti hai. Jaise Water Hole attack mai Beef Framework ka use karke kiya jata hai.

Jab koi user kisi tarah ki website ko open karta hai aise mai apni kisi website par bhi redirect karvaya ja sakta hai. Is tarah ke bahut sare attacks ko MITM attack ki help se kiya jata hai.

MITM attack ka practical karne se pahle aap ek bar iski theory ko jarur padh le. Yeh apko Facebook Hacking ke article mai btaya gaya hai.

How to do MITM Attack ?

Yaha hum MITM attack ke liye jis tool ka use kar rahe hai uska naam tornado hai. Yeh apko github par mil jayga. Sabse pahle apko git clone https://github.com/reb311ion/tornado is tarah se tool ko download karna hoga.

Yeh tool kuch is tarah se open hota hai. Yaha tool download hone ke baad apko command deni hogi (./setup.sh) kuch is tarah se. Iske baad (./tornado.sh) yeh command dekar tool run kar sakte hai.

MITM Attack

Kuch is tarah se MITM attack karne ke liye sabse pahle apko network se connected sabhi computers ko scan karna hoga. Aap command dekh sakte hai. (./tornado.sh -t 192.168.43.1/24 –map-lan -F).

Sath hi aap dekh sakte hai. Yaha humne humare dusre Computer par Keylogger ko active kiya hai. Kuch is tarah (./tornado.sh -i eth0 192.168.43.162 -g 192.168.43.1 -L alert.js –js-keylogger).

Yaha -i ka use interface ke liye kiya gaya hai -t ka use target ke liye kiya gaya hai -g ka use gateway ke liye kiya gaya hai. Yeh sab apko tool run hone par show ho jata hai.

Aap vaha se pad kar bhi inka use kar sakte hai. Yeh tool ka use MITM attack ke liye kiya jata hai. Aise mai targeted PC mai victim ke through press ki gyi keys apko show ho jati hai. Kuch is tarah.

Aise hi aap dusri commands ka bhi use kar sakte hai. Hum apko ek or use karke bata rahe hai. Yeh sab apko tool run hote hai eg mai show ho jata hai kis tarah se apko iska use karna hai.

MITM Attack

Yaha aap dekh sakte hai humne dusre attack ko perform kiya hai. Aap upar command dekh sakte hai. Is tarah se command jab aap dete hai arpspoof attack bhi start ho jayga. Apke three terminal apne aap open ho jate hai.

MITM Attack

Yaha aap dekh sakte hai is tarah se MITM attack kiya jata hai. Apke samne yeh three terminal automatic hi open ho jayge. Yaha green words vale mai aap h likh kar dekh sakte hai. Kuch is tarah.

MITM Attack

Yaha aap help mai dekh sakte hai. Aap victim ke pc par in sabhi attacks ko MITM attack ke through perform kar sakte hai. Jaise plugin activate karna Host list apko sab kuch btaya gaya hai.

MITM Attack

Yaha aap dekh sakte hai sabhi connected device ki information show ho rahi hai. Is tarah se aap sabhi features ka use kar sakte hai. Sabhi ke bare mai bata pana possible nahi hai. Is tarah se MITM attack kiya jata hai.

The Conclusion

Main umeed karta hu ki apko MITM attack ke bare mai pata chal gaya hoga. MITM attack ko aap WAN Network mai nahi kar sakte hai.

Yaha humne ek tool ka use kiya hai tornado. Aise hi or bhi hai jaise xerosploit, Websploit yeh sabhi ka bhi use kiya jata hai. Inke bare mai bhi apko age bata diya jayga.

Yeh sab apko educational purpose ke liye btaya gaya hai. Aap inka miss use kabhi mat karen. Yaha aap agar inka use karte hai tabhi aap sikh sakte hai. Apko kisi bhi tarah ki problem ya error milti hai to aap comment kar sakte hai.

Main apko Ethical Hacking, CEH, CHFI, OSCP ke sabhi concepts ke bare mai bata dunga. Lekin agar aap inka practical nahi karte hai tab aap ache se samjh nahi sakte hai.

MITM attack ki help se hackers bahut tarah ki hacking kar sakte hai. Jaise Facebook hacking Redirect karva kar, Gmail account hacking or bhi bahut kuch kiya ja sakta hai.

Ethical Hacking ki field mai kisi ek attack ko karne ke liye bahut attacks ka ek sath bhi kabhi kabhi use karna hota hai. Tabhi attacks successful hote hai.

Yeh sab knowledge theory ke liye sahi hai. Lekin apko Practical bhi jarur karna chahiye. Hum apko jitne bhi Topics bata rahe hai aap sabhi ka practical apne hi devices par karen.

Agar apka kisi bhi tarah ka koi question hai aap comment mai puch sakte hai. Humari taraf se apki puri help ki jayegi. Humare articles ko sabse pahle padne ke liye humare blog ko subscribe jarur karen.

Sharing is caring

Thankyou

Be the first to comment

Leave a Reply

Your email address will not be published.


*