• We just launched and are currently in beta. Join us as we build and grow the community.

Session Hijacking using Ettercap, Hamster and Ferret (A Beginner Guide)

asadsumra99

Data Exfiltration Specialist
A Rep
0
0
0
Rep
0
A Vouches
0
0
0
Vouches
0
Posts
89
Likes
38
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
From Wikipedia

Session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim’s computer.

First of all, login to Kali Linux and select ettercap .

1.png


Click on sniff. Select unified sniffing option.

2.png


It will ask for network interface. Select eth0 and click OK.

3.png


Now select Hosts and click on scan for hosts or press ctrl+s.

4.png


It will show the IP Addresses in the network. Select the target IP Address like 192.168.1.106 and click on add to Target 1.

5.png


Now select Mitm ( man in the middle) option. Click on ARP poisoning.

7.png


It will ask for sniff remote connections or only poison one-way. Check the option sniff remote connections.

8.png


Now Select start option and click on start sniffing or press shift+ctrl+W.

9.png


It will show sniffing.

11.png


Now select hamster tool to manipulate data by using proxy.

12.png


It will show browser proxy such as http://127.0.0.1:1234.

13.png


Now select ferret tool to grab the session cookies.

14.png


Type the command ferret –i eth0.

15.png


Now type 127.0.0.1:1234 in the browser and click on target IP. It will show Session Cookies.

16.png
 

452,292

324,360

324,368

Top