{"id":124,"date":"2014-03-22T22:28:37","date_gmt":"2014-03-23T04:28:37","guid":{"rendered":"http:\/\/xnm13.com\/?p=124"},"modified":"2014-03-22T22:28:37","modified_gmt":"2014-03-23T04:28:37","slug":"contrasenas-red-wifi-ettercap","status":"publish","type":"post","link":"https:\/\/elias.im\/blog\/2014\/03\/22\/contrasenas-red-wifi-ettercap\/","title":{"rendered":"Archivo: Capturando contrase\u00f1as en una red local con Ettercap"},"content":{"rendered":"<div><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/4.bp.blogspot.com\/-AdiiU95vlh0\/TqA7IhFGveI\/AAAAAAAAAZU\/wC7OsLDAlf8\/s400\/02.png\" width=\"400\" height=\"305\" border=\"0\" \/><\/div>\n<p>En este post aprenderemos a capturar una contrase\u00f1a encriptada de un sitio que funcione con\u00a0<i>https<\/i>\u00a0que se caracteriza por ser &#8220;muy segura&#8221;.<br \/>\nTodo esto lo realizaremos bajo\u00a0<i>Linux<\/i> (En este caso Linux Mint 9)\u00a0con el programa\u00a0<i>Ettercap.<\/i><br \/>\n<!--more--><br \/>\nPrimero abrimos el programa con privilegios de\u00a0<em>Root<\/em><\/p>\n<div><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/4.bp.blogspot.com\/-r8Go3VVUJYI\/TqA-kwEszNI\/AAAAAAAAAZc\/UkDQtziWLqw\/s400\/01.png\" width=\"400\" height=\"67\" border=\"0\" \/><\/div>\n<p><b><i><br \/>\n<\/i><\/b><br \/>\nEn este punto se\u00a0abrir\u00e1\u00a0el programa en modo\u00a0gr\u00e1fico\u00a0(gtk)<br \/>\nAhora entramos a\u00a0<i>Sniff<\/i>\u00a0\/\u00a0<i>Unified Sniffing,\u00a0<\/i>nos preguntara cual es nuestra interfaz inal\u00e1mbrica.<\/p>\n<div><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/4.bp.blogspot.com\/-pHhbs9GD8AA\/TqA_udkmvUI\/AAAAAAAAAZk\/HPtZsYPdyHs\/s400\/03.png\" width=\"400\" height=\"308\" border=\"0\" \/><\/div>\n<p>Nos\u00a0aparecer\u00e1n\u00a0nuevas opciones, seleccionamos\u00a0<i>Hosts<\/i>\u00a0\/\u00a0<i>Scan for hosts\u00a0<\/i>y comenzara a buscar dispositivos en la red local<\/p>\n<div><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/3.bp.blogspot.com\/-VYuFb61lt7s\/TqBBnlJm3eI\/AAAAAAAAAZ0\/lQOy4zbEsYg\/s400\/04.png\" width=\"400\" height=\"300\" border=\"0\" \/><\/div>\n<p>Ahora para mostrar los <em>Hosts<\/em>, entramos a\u00a0<i>Hosts<\/i>\u00a0\/\u00a0<i>Hosts List<\/i><b><i>\u00a0<\/i><\/b><\/p>\n<div><img decoding=\"async\" alt=\"\" src=\"http:\/\/2.bp.blogspot.com\/-nZ90dvpN-FI\/TqBBNmGva5I\/AAAAAAAAAZs\/C9524q4_o9Y\/s1600\/05.png\" border=\"0\" \/><\/div>\n<p>Seleccionamos la IP de nuestra &#8220;victima&#8221; y clickeamos\u00a0<i>Add to Target 1<\/i>\u00a0y la puerta de enlace &#8220;<i>Router<\/i>&#8221; como\u00a0<i>Add to Target 2<\/i>.<br \/>\nSeguido de esto vamos a\u00a0<i>Mitm<\/i>\u00a0\/<i>\u00a0Arp poisoning<\/i>, marcamos la opcion\u00a0Sniff remote connections<b>\u00a0<\/b>y pulsamos OK.<\/p>\n<div><img decoding=\"async\" alt=\"\" src=\"http:\/\/4.bp.blogspot.com\/-3M1od4XBO-g\/TqBDV22L0vI\/AAAAAAAAAZ8\/xkpgTOpbYps\/s1600\/06.png\" border=\"0\" \/><\/div>\n<p>Por ultimo\u00a0<i>Start\u00a0<\/i>\/\u00a0<i>Start sniffing<\/i><\/p>\n<div><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/1.bp.blogspot.com\/-KyYbjlTlr0g\/TqBEO1NYJzI\/AAAAAAAAAaE\/pTkxcdzXhfk\/s400\/07.png\" width=\"400\" height=\"292\" border=\"0\" \/><\/div>\n<p>Y\u00a0esperamos\u00a0a la &#8220;victima&#8221; hasta capturar alguna contrase\u00f1a.<\/p>\n<div><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/3.bp.blogspot.com\/-aPC8EqRhvKc\/TqBEneEMweI\/AAAAAAAAAaM\/u3VW2LKE1-M\/s400\/08.png\" width=\"400\" height=\"291\" border=\"0\" \/><\/div>\n<p>En este caso hemos tenido\u00a0\u00e9xito\u00a0capturando una contrase\u00f1a de Facebook.<br \/>\nAl terminar siempre debemos detener los ataques\u00a0<i>Mitm<\/i>\u00a0\/ S<i>top mitm attacks<\/i>\u00a0y\u00a0Start\u00a0\/<i>Stop sniffing<\/i><br \/>\n<b><i><\/i><\/b><br \/>\n<strong>Edit: Al principio en plugins debemos activar\u00a0<em>sslstrip<\/em>.<br \/>\n<\/strong><br \/>\n<i>Y con esto terminamos nuestro cometido.<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En este post aprenderemos a capturar una contrase\u00f1a encriptada de un sitio que funcione con\u00a0https\u00a0que se caracteriza por ser &#8220;muy segura&#8221;. Todo esto lo realizaremos bajo\u00a0Linux (En este caso Linux Mint 9)\u00a0con el programa\u00a0Ettercap.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,8,11],"tags":[],"class_list":["post-124","post","type-post","status-publish","format-standard","hentry","category-general","category-hacking","category-tutoriales"],"_links":{"self":[{"href":"https:\/\/elias.im\/blog\/wp-json\/wp\/v2\/posts\/124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elias.im\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/elias.im\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/elias.im\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elias.im\/blog\/wp-json\/wp\/v2\/comments?post=124"}],"version-history":[{"count":0,"href":"https:\/\/elias.im\/blog\/wp-json\/wp\/v2\/posts\/124\/revisions"}],"wp:attachment":[{"href":"https:\/\/elias.im\/blog\/wp-json\/wp\/v2\/media?parent=124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/elias.im\/blog\/wp-json\/wp\/v2\/categories?post=124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/elias.im\/blog\/wp-json\/wp\/v2\/tags?post=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}