On this occasion I want to use ettercap. What he says can be in every way
Okay go ahead,
Open a terminal and type the following commands :
Wait until Ettercap is open. When that happens, click Sniff on the toolbar and select unifield sniffing from the sniff menu as shown below :
Choose the interface that is connected to the network, because I use wifi so my interface is wlan0.
(if you want to see the interface can menggetikkan ifconfig in the terminal)
Now Ettercap must load into host attack attack mode and select host scan from the menu :
Ettercap will briefly scan hosts on the network, After a while, we will see the words "host added to the host list" in the command box.
then click host again, and this time select host list in the host menu
Click the IP address of the router and click add to terget 1.
![Screenshot from 2015-08-11 06-22-47.png]
Then select IP from your victim test machine and click add to Target 2.
()
Now click mitm on the toolbar and select arp poisoning:
When the question box appears, check the box next to the sniff remote connection and hit ok
Ettercap will now poison victims and routers. Now if we want to see the victim's personal info, we should click start on the toolbar and select start sniffing
Ettercap will tell you that sniffing has started.
We can now use tools such as URLsnarf and SSLStrip to sniff information about the victim's internet traffic. To stop MITM attacks, click MITM and select stop mitm attack (s) from the menu.
Ettercap will then send the ARP packet correction, and the network will return stable. You can then close Ettercap.