Lab 10.2.6 Perform a Man-in-the-Middle DHCP Attack [WLOs: 1, 2, 3, 4, 5] [CLOs: 1, 2, 3]
Required Actions & Questions
Your answer: 5
Correct answer: 5
Your answer: 192.168.0.5, 192.168.0.46
Correct answer: 192.168.0.5, 192.168.0.46
Complete this lab as follows:
- On IT-Laptop, start unified sniffing on the enp2s0 interface as follows:
- From the Favorites bar, select Ettercap.
- Select Sniff > Unified sniffing.
- From the Network Interface drop-down list, select enp2s0.
- Click OK.
- Select Mitm > DHCP spoofing.
- In the Netmask field, enter 255.255.255.0.
- In the DNS Server IP field, enter 192.168.0.11.
- Click OK.
- On Support, start a capture that filters for bootp packets as follows:
- From top navigation tabs, select Floor 1 Overview.
- Under Support Office, select Support.
- From the Favorites bar, open Wireshark.
- Under Capture, select enp2s0.
- Select the blue fin to begin a Wireshark capture.
- In the Apply a display filter field, type bootp and press Enter.
- Request a new IP address as follows:
- From the Favorites bar, open Terminal.
- At the prompt, type ip addr show and press Enter.
The IP address for enp2s0 is 192.168.0.45. - Type route and press Enter.
The gateway is 192.168.0.5. - Type ip link set enp2s0 down and press Enter.
- Type ip link set enp2s0 up and press Enter to bring the interface back up.
- Maximize Wireshark for easier viewing.
In Wireshark, under the Info column, notice that there are two DHCP ACK packets. One is the real acknowledgment (ACK) packet from the DHCP server, and the other is the spoofed ACK packet. - Select the first DHCP ACK packet received.
- In the middle panel, expand Bootstrap Protocol (ACK).
- Expand Option: (3) Router.
Notice the IP address for the router. - Repeat steps 3g-3i for the second ACK packet.
- In the top right, select Answer Questions.
- Answer the questions.
- Minimize Wireshark.
- View the current IP addresses as follows:
- In Terminal at the prompt, type ip addr show and press Enter.
The IP address is 192.168.0.45. - Type route and press Enter.
The current gateway is 192.168.0.46. This is the address of the computer performing the man-in-the-middle attack.
- In Terminal at the prompt, type ip addr show and press Enter.
- On Office1, view the current route and IP address as follows:
- From top navigation tabs, select Floor 1 Overview.
- Under Office 1, select Office1.
- Right-click Start and select Windows PowerShell (Admin).
- Type tracert rmksupplies.com and press Enter.
Notice that the first hop is 192.168.0.5. - Type ipconfig /all and press Enter to view the IP address configuration for the computer.
The configuration for Office1 is as follows:- IP address: 192.168.0.33
- Gateway: 192.168.0.5
- DHCP server: 192.168.0.14
- At the prompt, type ipconfig /release and press Enter to release the currently assigned addresses.
- Type ipconfig /renew and press Enter to request a new IP address from the DHCP server.
Notice that the default gateway has changed to the attacker's computer which has an IP address of 192.168.0.46. - Type tracert rmksupplies.com and press Enter.
Notice that the first hop is now 192.168.0.46 (the address of the attacker's computer).
- In Google Chrome, log into the rmksupplies.com employee portal as follows:
- From the taskbar, open Google Chrome.
- Maximize the window for easier viewing.
- In the URL field, enter rmksupplies.com and press Enter.
- At the bottom of the page, select Employee Portal.
- In the Username field, enter bjackson.
- In the Password field, enter $uper$ecret1.
- Select Login. You are logged in as Blake Jackson.
- From IT-Laptop, find the captured username and password in Ettercap as follows:
- From top navigation tabs, select Floor 1 Overview.
- Under IT Administration, select IT-Laptop.
- Maximize Ettercap.
- In Ettercap's bottom pane, find the username and password used to log in to the employee portal.
- In the top right, select Answer Questions to end the lab.
- Select Score Lab.
Comments
Post a Comment