1 00:00:00,150 --> 00:00:02,550 Hello everybody and welcome back. 2 00:00:02,550 --> 00:00:08,040 And basically what we will do right now is I will show you how you will install a tool that we will 3 00:00:08,040 --> 00:00:12,480 be using in order to perform our man in the middle attack. 4 00:00:12,480 --> 00:00:18,090 Now that tool is called basically man in the middle framework and it comes. 5 00:00:18,330 --> 00:00:24,150 Well it doesn't come pre installed on clinics so you will have to insulate from the hip hop repository. 6 00:00:24,150 --> 00:00:27,720 And after that we just need to install some of the requirements that it has. 7 00:00:27,780 --> 00:00:32,920 And basically after that you will be good to go and you will be able to run the program. 8 00:00:32,970 --> 00:00:39,030 Now I already have it installed right here as we can see it is right here man in the middle framework. 9 00:00:39,990 --> 00:00:43,620 So but I will still show you how you can download it yourself. 10 00:00:43,680 --> 00:00:52,120 So go to the Firefox open up in Firefox and basically what you want to search is just me and my TMF 11 00:00:52,260 --> 00:00:58,110 And then uh GitHub so you open up the first link and we will download it from there. 12 00:00:58,110 --> 00:01:00,150 Let me just open this up. 13 00:01:02,350 --> 00:01:03,440 And let's search. 14 00:01:03,450 --> 00:01:06,180 Am I TMF GitHub. 15 00:01:06,400 --> 00:01:12,520 So we click their presenter and will open up the first thing that comes up which is this one so click 16 00:01:12,520 --> 00:01:17,540 on it and you will see that this this is the tool that we will use. 17 00:01:17,650 --> 00:01:20,220 Now if you scroll down here you will see its files. 18 00:01:20,230 --> 00:01:22,440 And here you will see some of the explanations. 19 00:01:22,480 --> 00:01:25,360 So it says right here this project is no longer being updated. 20 00:01:25,360 --> 00:01:30,920 So uh you might need to add some configurations yourself if it doesn't work. 21 00:01:30,990 --> 00:01:35,380 Uh so that we know of but we will install the comments ourselves. 22 00:01:35,410 --> 00:01:38,350 So here you have some of the features. 23 00:01:38,360 --> 00:01:38,830 Yeah. 24 00:01:38,830 --> 00:01:44,310 Here you have the description and my TMF aims to provide a one stop shop for men in the middle and network 25 00:01:44,310 --> 00:01:48,340 text while updating and improving existing attacks and techniques. 26 00:01:48,340 --> 00:01:56,290 So active packet filtering modification you can also use uh Skippy to do that as we can see right here. 27 00:01:56,410 --> 00:02:01,030 This is some ICMP packet just this is just an example. 28 00:02:01,120 --> 00:02:03,760 Here we have some of the examples of the usage. 29 00:02:03,940 --> 00:02:09,730 We will basically cover all of these or most of these in the next lectures for now and we just want 30 00:02:09,730 --> 00:02:11,430 to install this program. 31 00:02:11,440 --> 00:02:13,500 Let me see if there is something down here. 32 00:02:13,720 --> 00:02:14,970 Currently available plugins. 33 00:02:14,980 --> 00:02:16,740 You can see what it currently has. 34 00:02:16,740 --> 00:02:20,490 So we have ACA drive by ASM SMB traps screenshots. 35 00:02:20,510 --> 00:02:23,620 We will also cover that respond to less cell strip. 36 00:02:23,620 --> 00:02:25,290 That was what I was talking about. 37 00:02:25,330 --> 00:02:32,740 If the uh you can use the ISO strip to bypass some of the EPA press websites in order to decrypt their 38 00:02:32,740 --> 00:02:34,930 data here we have proof. 39 00:02:34,930 --> 00:02:37,280 So we would be using the ARB spoofing. 40 00:02:37,420 --> 00:02:44,200 Also some of the DNS spoofing uh you have some of the other options such as inject file prone browser 41 00:02:44,260 --> 00:02:50,550 browser profiler and key loggers and all of the other stuff that we will also cover. 42 00:02:50,590 --> 00:02:55,840 So right now what we want to do is just download this file so let us copy the link 43 00:02:59,560 --> 00:03:02,050 and basically open up our terminal. 44 00:03:03,520 --> 00:03:11,360 Let me just type in my root password so change to the desktop and we type your get clone and then paste 45 00:03:11,360 --> 00:03:19,150 the link and add dot get so baseball download the file for us in a while for you since for me it already 46 00:03:19,150 --> 00:03:19,630 exists. 47 00:03:19,630 --> 00:03:22,870 As I said I already have it downloaded right here. 48 00:03:22,870 --> 00:03:30,050 And once you do that once it downloads and it copies the the file into the M.I.T. Mia the am I. 49 00:03:30,050 --> 00:03:36,310 TMF directory you want to change the path to that directory and you will have this file right here called 50 00:03:36,370 --> 00:03:38,170 requirements start to 60. 51 00:03:38,200 --> 00:03:43,630 Now in order in order to install those requirements you just want to type your pip install minus our 52 00:03:43,750 --> 00:03:45,900 requirements not to exceed. 53 00:03:46,350 --> 00:03:51,880 And it will install install all of the requirements it needs in order to run this program. 54 00:03:51,880 --> 00:03:58,110 Now that could take a few minutes to finish depending on how many requirements you already have satisfied. 55 00:03:58,720 --> 00:04:00,970 But once it finish that you want. 56 00:04:01,000 --> 00:04:07,340 Once it finishes that you basically just want to top type here and my TMF not by. 57 00:04:07,390 --> 00:04:09,200 And it will run the program for you. 58 00:04:09,220 --> 00:04:14,410 Now I believe I need to specify or wait let me just check something. 59 00:04:14,460 --> 00:04:14,790 OK. 60 00:04:14,800 --> 00:04:20,460 So it gives us the output of that program as you can see there are a bunch of options right here. 61 00:04:20,470 --> 00:04:23,080 Here we got some pretty bad right here. 62 00:04:23,080 --> 00:04:29,190 You can type minus minus help which basically gives you the same output as this comment which without 63 00:04:29,190 --> 00:04:34,240 a minus minus Well we have some of the other options such as interface that we will have to specify 64 00:04:34,240 --> 00:04:41,530 at all of the times or to read the config file filter spool far biasing MPD or CPE so these are just 65 00:04:41,540 --> 00:04:43,700 bunch of the options for spoofing. 66 00:04:43,790 --> 00:04:52,480 We are back at the ICMP packets the DCP packet DNS packets and so on shell shock payload we did cover 67 00:04:52,480 --> 00:04:53,930 what shell shock is. 68 00:04:54,190 --> 00:04:56,760 You will also need to specify the gateway. 69 00:04:56,830 --> 00:05:01,130 So the program knows who is the router. 70 00:05:01,540 --> 00:05:06,410 Here we have the load plug in so we can inject the javascript code. 71 00:05:06,490 --> 00:05:08,980 So that could be interesting. 72 00:05:09,190 --> 00:05:11,200 Here we have some of the. 73 00:05:11,200 --> 00:05:16,720 My type is black eyed peas by domains black domains inject content only for these domains. 74 00:05:16,720 --> 00:05:19,820 So this is basically just white listing and blacklisting. 75 00:05:19,960 --> 00:05:27,410 We have the je ne our script key logger as we can see right here we will also try to use that and we 76 00:05:27,410 --> 00:05:31,030 have a bunch of these other options that we can use as well. 77 00:05:31,070 --> 00:05:36,710 Now we will cover all of those in the next videos from now on I just want to show you how you can install 78 00:05:36,710 --> 00:05:40,310 this tool and you can see what kind of options it provides. 79 00:05:40,310 --> 00:05:44,590 So the other tool that we will also cover after this. 80 00:05:44,930 --> 00:05:49,140 But not so deep but not in details would be the better cap. 81 00:05:49,430 --> 00:05:54,070 It comes pre installed in clinics and also I have it installed right here. 82 00:05:54,560 --> 00:05:59,990 So you will be able to use it without downloading it will cover some of the basics for it as well. 83 00:05:59,990 --> 00:06:06,410 It is also used for the man in the middle attacks and you after this section you will have a really 84 00:06:06,410 --> 00:06:12,260 good understanding of how men in the middle attacks work and you will also know how to perform them 85 00:06:12,980 --> 00:06:16,730 but you will also know that it is something that can be easily detected. 86 00:06:16,730 --> 00:06:22,610 So our reporting is especially easily detected and I will also show you how you can do that. 87 00:06:22,670 --> 00:06:29,000 It can also be done with a simple python program which we will make later on but for now on that would 88 00:06:29,000 --> 00:06:29,660 be it. 89 00:06:29,660 --> 00:06:35,870 So in the next lectures we will continue using these two tools and I hope I see you there by.