UGN Security Forums
My ProfileMember DirectoryLogin
Search our ForumsView our FAQView our Site Rules
View our CalendarView our Active TopicsGo to our Main Page

UGN Security Store
 

Network Sites UGN Security, The GoNix Initiative, Elite Web Gamers, Back of the Web, EveryDay Helper, VNC Web Design & Development
November
Su M Tu W Th F Sa
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30
Sponsored Links
Latest Postings
Latest Reviews
Topic Options
Rate This Topic
#53225 - 03/10/11 06:45 PM LAN Hacking Noob
Fountainhead Offline
UGN Newbie

Registered: 03/10/11
Posts: 3
Loc: Guayaquil - Ecuador
Hi everyone.

I am just getting started in hacking, with a current concrete motivation: I want to learn how to watch, interpret, and use information in my LAN network. In particular, and as a startup challenge, I'd like to retrieve every single password users on my LAN have for Hotmail, Facebook, Youtube, etc., and their windows login password.

The LAN I'm describing is that of a small business where I work, so the users are always the same.

I just saw some videos about Ettercap, and I have downloaded the Windows version. Since I understand Windows sucks for the purpose, i have also installed CYGWIN and I'm starting to learn some basic commands. I'm on my way to installing Ettercap also within CYGWIN.

What I need, if someone is willing to help this noob retard, is a walktrhough.

As a side note, I started using Ettercap (windows) yesterday, and it worked to a certain extent. I was able to ARP poison a local computer which i also had access to; able meaning [1] I attacked Target 1 (victim computer) and Target 2 (server IP), [2] I checked 'arp -a' in the victim computer in order to verify the poisoning had taken place and [3] ran the ettercap poison check pluggin with success.

Nevertheless, when I entered a facebook and hotmail username and password in the victim computer, Ettercap failed to retrieve those passwords.

Additionally, I was only able to perform poisoning in promisc 'unified sniffing' mode. Whenever I used the subtler mode, poisoning failed. Being advised from the tutorial videos that promisc mode was agressive on servers, I tried 'poison only one way', resulting in succesful poisoning in the victim computer in the extent above said (arp -a checking the victim computer), but again ethercap failed to retrieve passwords.

Evidently, the times i've tried to poison both targets, server included, with promisc mode, the poisoning didn't last long because the administrator responded by reseting the server.

If anyone is willing i'd very much appreciate some help.

FOUNTAINHEAD.

Top
Sponsored Links
      
#53228 - 03/10/11 08:27 PM Re: LAN Hacking [Re: Fountainhead]
Fountainhead Offline
UGN Newbie

Registered: 03/10/11
Posts: 3
Loc: Guayaquil - Ecuador
I have also noted that since I started the obviously unsuccessful attacks, the number of IPs that pop upon self 'arp -a' request have gone down. Does this affect my ability to ARP poison, meaning I can only poison IPs which appear on my arp -a request? Is this an ordinary behavior or may it suggest my clumsy 'promisc' ARP requests to the gateway made the administrator become aware of me as the attacker and is somehow attempting to hinder my ability to poison? If the latter is true, is there some way to override him, maybe changing my mitm choice?

Top
#53232 - 03/11/11 12:11 AM Re: LAN Hacking [Re: Fountainhead]
Gremelin Offline

Community Owner
*****

Registered: 02/28/02
Posts: 7193
Loc: Portland, OR; USA
I haven't really used Ettercap (or any other data sniffer) in years (we're talking 2002 or so), one thing to keep in mind is that you're not going to have much success in sniffing secure (ssl) internet connections; in fact, most services that require login now preform the login through ssl to ensure sniffers cannot capture login data.

You can test by going to www.hotmail.com and noting that it redirects you to an SSL page to input login data; the result, you'll never be able to sniff logins for hotmail, the host is an SSL system which is using a 128bit rc4 encrypted connection.
_________________________
Donate to UGN Security here.
UGN Security, Back of the Web, Elite Web Gamers & VNC Web Design Owner

Top
#53234 - 03/11/11 01:10 AM Re: LAN Hacking [Re: Gremelin]
Fountainhead Offline
UGN Newbie

Registered: 03/10/11
Posts: 3
Loc: Guayaquil - Ecuador
Thank you very much for your quick response. Ok, so wrong target then. I chose usernames and passwords because its commonplace, but I actually have little interest in reading personal stuff. Maybe you could lead me better in 'the hacker way'. What kind of data is retrievable in LAN as a startup? What things are doable without requiring mayor security cracking? Im just bored with usual internet navigation, I want some real 'flesh and bone data' if you know what I mean.

Top
#53245 - 03/12/11 02:42 AM Re: LAN Hacking [Re: Fountainhead]
Gremelin Offline

Community Owner
*****

Registered: 02/28/02
Posts: 7193
Loc: Portland, OR; USA
Well, sniffing the connection itself would be a good starting point; you're likely not going to capture usernames/passwords on large sites (as they'll usually be using SSL) but smaller sites such as those with bulletin boards (heh, hmm) you'd be able to sniff things from there.
_________________________
Donate to UGN Security here.
UGN Security, Back of the Web, Elite Web Gamers & VNC Web Design Owner

Top

Moderator:  Infinite 
Featured Member
Registered: 03/02/02
Posts: 136
Forum Stats
2151 Members
46 Forums
35761 Topics
70931 Posts

Max Online: 1567 @ 04/25/10 05:20 AM
Top Posters
UGN Security 28922
Gremelin 7193
§intå× 3255
SilentRage 1273
Ice 1146
pergesu 1136
Infinite 1041
jonconley 955
Girlie 908
unreal 860
Newest Members
HushHush, golqm, Tim050, Gecko666, defghi795767
2150 Registered Users
Who's Online
0 registered (), 413 Guests and 310 Spiders online.
Key: Admin, Global Mod, Mod
Latest News
luxury goods sales at $405B by 2019
by golqm
10/28/14 05:19 AM


Donate
  Get Firefox!
Get FireFox!