Jump to content

Any Way to be in MITM into a network


1337.pdf

Recommended Posts

Hello Hackers !!!

I am new into infosec practically i was learning before but now into industry work so i am fed up of searching different methodology, tools, frameworks.

I am stucked with something real life scenarios, there is wifi router which have 10 users. Me as admin of that router, how can i access these 10 users (PC, Andriod, etc) ?

I tried wireshark, and many other stuff didnt get anything suitable? can i do this via adding a default welcome page to my router if some one connect will have to download something or something like this?

a Newbie need help ;D

Link to comment
Share on other sites

On 11/3/2018 at 10:44 AM, 1337.pdf said:

Hello Hackers !!!

I am new into infosec practically i was learning before but now into industry work so i am fed up of searching different methodology, tools, frameworks.

I am stucked with something real life scenarios, there is wifi router which have 10 users. Me as admin of that router, how can i access these 10 users (PC, Andriod, etc) ?

I tried wireshark, and many other stuff didnt get anything suitable? can i do this via adding a default welcome page to my router if some one connect will have to download something or something like this?

a Newbie need help ;D

Hint : You're not getting anything interesting because you're not piping /   redirecting their traffik through you, before it goes to the router.

Free hint : Read up on networking, ARP a.s.o

Just because you own the router / have admin privs on it, doesn't give you any right to attack users through exploiting them, which it sounds to me you're after a solution to how to do.

On 11/3/2018 at 11:14 AM, 1337.pdf said:

all i mean how to access to these devices who is connected to my router? except just monitoring HTTP traffic

As Digininja asked, have you gotten  the users permission to using exploits against them ?
If not, even though you  own the network, you're still breaking the law as I see it. If' you're targeting any others system, without their consent, you're comitting a crime.

The only acceptable situation, is informing them they are running on a privately owned network, that all traffick is monitored and logged, and if they use the network, they are accpting that.
(Think VERY large signs stating the conditions of use) Still that won't give you any rights to use captive portals, exploits and so on..

/Kent

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...