JustPaste.it

Man-in-the-middle attack tutorial ᵀᴹ

This is a detailed tutorial of how to do a man-in-the-middle attack on a bank.

 

f274d1b8dda1e5a51da57baa33922681.jpg

 

First obtain the banks cloud server IP address.

 

https://www.nslookup.io/website-to-ip-lookup/

 

08ad8da1b60e9a4e4bcdd7a129f1e560.png

 

Then use https://nmap.org/zenmap/ Nmap Scanner utility to obtain cloud servers mac address and open ports.

 

228a7f1441d9cfc34077d85b1415009e.png

 

Now use https://www.wireshark.org/ Wireshark to capture the servers certificate and apply filter with MAC address, IP address and ports of packets you want to capture.

 

ccccd10474735320fdbf3ef734000311.png

 

Either go to the website or use Nmap scan to obtain the server certificate from cloud provider.

 

Now look for server certificate in Wireshark and notice the IP address is different as the certification server is probably independent internal server although the MAC address being served is from the cloud providers router.

 

b30cbafaa888644b227bb37483480d16.png

 

Host the websites domains you have downloaded with https://www.httrack.com/ HTTrack website copier.

 

3cc5d25f9106c9fde288a5c538c527cf.png

 

Copy the certificate and save as .pem file for later website spoofing on Apache web server.

 

Use https://directory.apache.org/studio/ Apache web server to host the spoofed website.

 

b9aa7c838acfe5b53aa92b8fcd6bc6a5.png

 

Then host the site and wait for root DNS records to be updated and collect as much bank customer details as you want.

 

Be sure to use https://technitium.com/tmac/ Technitium MAC Address Changer and VPN connections to mask your identity from authorities. 

 

screenshot1.png

 

For legal reasons I have not downloaded a bank website to be spoofed on my web server.

 

Common Reasons People Hire Attorneys - Legal Help Club

 

I.T. Development, Alec Bellamy

 

Smart Industries Limited  ᵀᴹ