![]() Verify that you have hijacked the session.įrom Conult-Lap2, connect to your rogue computer as follows: 1. On Consult-Lap, go to and use the cookie editor plug-in to inject the session ID cookie. Log in to the employee portal using the following credentials: - Username: bjackson - Password: $uper$ecret1 On Consult-Lap2, copy the session ID detected in Ettercap. In this lab, your task is to complete the following: On Consult-Lap2, use ssh -X to connect to your rogue computer using the following parameters: - IP address: 192.168.0.251 - Password: $uper$neaky Use Ettercap and the following parameters to launch a DHCP spoofing man-in-the-middle attack on your rogue computer and attempt to capture any unsecure passwords: - Network Interface: enp2s0 - Netmask: 255.255.255.0 - DNS Server IP address: 192.168.0.11 On Exec, release and renew the IP address assigned by DHCP. Using the small computer you left behind, you can perform remote exploits against the company. Now you are sitting in your van in the parking lot of CorpNet.xyz, where you have connected to the internal network through the rogue wireless access point. This computer also functions as a rogue wireless access point. While visiting the company, you connected a small computer to the switch in the Networking Closet. 10.2.7 Perform an MITM Attack from a Remote Computer CorpNet.xyz has hired you as a penetration testing consultant. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |