tltltititltl Posted March 31, 2006 Share Posted March 31, 2006 Hey! I remember watchin a segment where u guys used cain & abel for arp cache poisoning. I noticed that u were using a dell notebook as well. I currently am using a dell laptop as well and i was wondering if u can use the wireless connection for the sniffer. I couldnt find any mac addresses using the intel pro wireless adapter and on the adapter list, there is also a warning about using an ethernet adapter. I was wondering if u can use a wireless for the sniffer. Thx Quote Link to comment Share on other sites More sharing options...
spektormax Posted March 31, 2006 Share Posted March 31, 2006 yes, you can used wirless to ARP poison and thefore create a man in the middle attacxk, but since it's a wireless network, simply puttign ur card in passive mode, and runnign a program such as etherial shoudl do the trcik.. Cain&Abel, does help you by catching passwords, as well as helpign crete fake cirtificates for SSL cross site scriting attacks Quote Link to comment Share on other sites More sharing options...
tltltititltl Posted March 31, 2006 Author Share Posted March 31, 2006 passive mode is done in linux rite? I was wondering if u can make the arp cache from cain & abel in windows ;x i couldnt get any mac address using the sniffer but it does work w/ the ethernet i was wonderin if it works for wireless adapter =/ thx Quote Link to comment Share on other sites More sharing options...
VaKo Posted March 31, 2006 Share Posted March 31, 2006 Cain & Able doesn't work that well with wireless setups in my expirence. You can haX0r people using wireless from a cabled connection, but not vice-versa or wireless to wireless. However, if you slap a linux live disc in there, and cable it in, you see EVERYTHING with ethereal. Quote Link to comment Share on other sites More sharing options...
tltltititltl Posted April 1, 2006 Author Share Posted April 1, 2006 oo! ic... thanks for the replies! Quote Link to comment Share on other sites More sharing options...
melodic Posted April 1, 2006 Share Posted April 1, 2006 oo! ic...thanks for the replies! have u tried what people have suggested ? :P who u gonna h4x0r Quote Link to comment Share on other sites More sharing options...
goldfish Posted April 3, 2006 Share Posted April 3, 2006 In this particular scenario it might help to understand what Cain is actually doing. To be honest you don't need to use ARP poisoning to read unencrypted traffic. Really, it's just a matter of firing up Ethereal and having a look at what you get. If you're not associated with the network then you can pop the card into passive mode (easier in Linux than Windows, but it's possible), if you are associated then you're good to go. All Cain really does is log packets recieved on the interface and look through them for passwords. If you look at Ethereal and log into an unencrypted HTTP Authenticated page you can quite easily spot the packets which contain the password. Cain just makes this easier by putting it into a nice Windows API listbox for you. In a wired-switched environment, you would need ARP poisoning to make each host send their packets to you before the send them to the gateway. Otherwise the switched network would not forward any packets which are not destined for your host, and you would only see the traffic between you and the gateway. This is the primary use for ARP poisoning. Quote Link to comment Share on other sites More sharing options...
Mr. Pickles Posted April 30, 2012 Share Posted April 30, 2012 passive mode is done in linux rite? I was wondering if u can make the arp cache from cain & abel in windows ;x i couldnt get any mac address using the sniffer but it does work w/ the ethernet i was wonderin if it works for wireless adapter =/ thx Wireshark dood! Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.