![]() Click outside the cookie editor to close the editor. Select the green check mark to save the cookie. In the Value field, press Ctrl + V to paste in the session cookie you copied from Ettercap.Make sure appears in the Domain field. At the top, select the plus + sign to add a new session cookie. In the top right corner, select cookie to open the cookie editor. From the top navigation tabs, select Building A. On Consult-Lap, go to and use the cookie editor plug-in to inject the session ID cookie as follows: 1. In the Ettercap console, find bjackson's username, password, and session cookie (.login) captured in Ettercap. On Consult-Lap2, copy the session ID detected in Ettercap as follows: 1. In the Password field, enter $uper$ecret1. At the bottom of the page, select Employee Portal. In the URL field, enter and press Enter. Log into the employee portal as follows: 1. Type ipconfig /renew and press Enter to request a new IP address from the DHCP server. Type ipconfig /release and press Enter to release the currently assigned addresses. Right-click Start and select Windows PowerShell (Admin). From top navigation tabs, select Buildings. On Exec, release and renew the IP address as follows: 1. In the DNS Server IP field, enter 192.168.0.11. From the Network Interface drop-down list, select enp2s0. At the prompt, type ettercap and press Enter to launch Ettercap remotely.Ettercap is running on the remote computer, but you see the screen locally. Use Ettercap to launch a DHCP spoofing man-in-the-middle attack as follows: 1. For the password, type $uper$neaky and press Enter. At the prompt, type ssh -X 192.168.0.251 and press Enter. From Conult-Lap2, connect to your rogue computer as follows: 1.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |