All language subtitles for 4. ARP Spoofing Using Bettercap

af Afrikaans
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 1 00:00:00,870 --> 00:00:01,950 Now, in this lecture, 2 2 00:00:01,950 --> 00:00:06,010 I wanna show you how to run an ARP spoofing attack 3 3 00:00:06,010 --> 00:00:07,800 using Bettercap. 4 4 00:00:07,800 --> 00:00:10,780 This will allow us to place our computer 5 5 00:00:10,780 --> 00:00:15,100 in the middle of the connection and intercept data. 6 6 00:00:15,100 --> 00:00:17,670 Not only that, but we're also gonna see 7 7 00:00:17,670 --> 00:00:19,490 how we can read this data. 8 8 00:00:19,490 --> 00:00:21,920 So we can see all the URLs 9 9 00:00:21,920 --> 00:00:25,000 and all the websites that the target visits 10 10 00:00:25,000 --> 00:00:27,670 and we'll see everything that they post. 11 11 00:00:27,670 --> 00:00:30,360 So anything any usernames, any passwords 12 12 00:00:30,360 --> 00:00:32,750 they send to any websites, 13 13 00:00:32,750 --> 00:00:35,343 we're gonna be able to capture them and see them. 14 14 00:00:36,930 --> 00:00:40,250 So, first we need to become the man in the middle. 15 15 00:00:40,250 --> 00:00:44,510 And we're gonna do this using a module called ARP spoof. 16 16 00:00:44,510 --> 00:00:47,500 So if I scroll up to the help menu, 17 17 00:00:47,500 --> 00:00:51,923 you can see we have a module here called ARP spoof. 18 18 00:00:53,990 --> 00:00:57,560 So as usual, if we don't know how to use this module, 19 19 00:00:57,560 --> 00:01:01,310 we're gonna do help arp.spoof, 20 20 00:01:01,310 --> 00:01:04,570 because we want to see how to use this module 21 21 00:01:04,570 --> 00:01:07,773 and see all the options that we can set for it. 22 22 00:01:08,660 --> 00:01:10,620 So as you can see, as usual, 23 23 00:01:10,620 --> 00:01:14,800 we can do arp.spoof on to turn this module on. 24 24 00:01:14,800 --> 00:01:17,160 We can do arp.ban on 25 25 00:01:17,160 --> 00:01:19,810 and this will literally just cut the connection 26 26 00:01:19,810 --> 00:01:21,110 of the target. 27 27 00:01:21,110 --> 00:01:22,280 This is very simple. 28 28 00:01:22,280 --> 00:01:24,070 You can try it on your own time. 29 29 00:01:24,070 --> 00:01:26,120 I'm not gonna do it here. 30 30 00:01:26,120 --> 00:01:29,340 You can do arp.spoof off to turn it off 31 31 00:01:29,340 --> 00:01:32,783 and arp.ban off to turn the ban off. 32 32 00:01:33,870 --> 00:01:36,980 Now, in the previous lecture I also said 33 33 00:01:36,980 --> 00:01:39,440 anything you see under the parameters 34 34 00:01:39,440 --> 00:01:44,000 are the options that we can set for this specific module. 35 35 00:01:44,000 --> 00:01:46,163 But I didn't show you how to modify that. 36 36 00:01:47,090 --> 00:01:48,270 So in this lecture, 37 37 00:01:48,270 --> 00:01:51,223 we're actually gonna be modifying some of these options. 38 38 00:01:52,250 --> 00:01:55,550 Now as you can see, the tool is actually very helpful 39 39 00:01:55,550 --> 00:01:58,460 because first of all it's given us the option name 40 40 00:01:58,460 --> 00:01:59,600 in yellow here. 41 41 00:01:59,600 --> 00:02:01,980 So these are the options that we can set, 42 42 00:02:01,980 --> 00:02:03,520 that we can change. 43 43 00:02:03,520 --> 00:02:05,550 And then it's also telling us 44 44 00:02:05,550 --> 00:02:08,350 a description of what this option does 45 45 00:02:08,350 --> 00:02:09,893 and the default value. 46 46 00:02:11,300 --> 00:02:13,530 So for example, we can see we have an option 47 47 00:02:13,530 --> 00:02:16,230 called arp.spoof.fullduplex. 48 48 00:02:17,080 --> 00:02:20,010 You can see the description for this option 49 49 00:02:20,010 --> 00:02:22,390 and basically what this option will do 50 50 00:02:22,390 --> 00:02:24,010 if you set it to true, 51 51 00:02:24,010 --> 00:02:28,100 it will spoof both the router and the target. 52 52 00:02:28,100 --> 00:02:31,130 So it's similar to what we did with ARP spoof 53 53 00:02:31,130 --> 00:02:33,750 when we executed the command twice 54 54 00:02:33,750 --> 00:02:36,440 to spoof both the router and the target. 55 55 00:02:36,440 --> 00:02:38,700 So if you set this to true, 56 56 00:02:38,700 --> 00:02:41,300 both the router and the target will be spoofed 57 57 00:02:41,300 --> 00:02:43,860 and you will be in the middle of the connection. 58 58 00:02:43,860 --> 00:02:47,300 If you leave it to the default, which is false, 59 59 00:02:47,300 --> 00:02:50,380 you will only spoof the target machine. 60 60 00:02:50,380 --> 00:02:52,010 Now this can be useful 61 61 00:02:52,010 --> 00:02:54,710 if the router has some sort of protection 62 62 00:02:54,710 --> 00:02:57,090 against ARP spoofing attacks 63 63 00:02:57,090 --> 00:03:00,980 because you won't to be interacting with router at all. 64 64 00:03:00,980 --> 00:03:04,980 But it's also limiting because we won't be able to do 65 65 00:03:04,980 --> 00:03:06,920 what I'm gonna do in the next lectures 66 66 00:03:06,920 --> 00:03:09,740 because the router will communicate 67 67 00:03:09,740 --> 00:03:11,780 with the target device directly. 68 68 00:03:11,780 --> 00:03:14,330 So we won't to be able to inject stuff 69 69 00:03:14,330 --> 00:03:18,543 in the responses that the router sends to the target device. 70 70 00:03:19,650 --> 00:03:22,380 Now, I actually wanna change this to true 71 71 00:03:22,380 --> 00:03:24,180 and the method I'm gonna do this 72 72 00:03:24,180 --> 00:03:27,530 can be used to change any option 73 73 00:03:27,530 --> 00:03:29,830 in any module in Bettercapp. 74 74 00:03:29,830 --> 00:03:32,690 So not only in the arp.spoof. 75 75 00:03:32,690 --> 00:03:34,620 If you're using any module, 76 76 00:03:34,620 --> 00:03:36,930 you can do help followed by the module name 77 77 00:03:36,930 --> 00:03:39,140 to get help about that module name. 78 78 00:03:39,140 --> 00:03:42,460 You can see all of the options that you can set in here. 79 79 00:03:42,460 --> 00:03:45,550 And then if you want to modify the value 80 80 00:03:45,550 --> 00:03:48,400 of any of these options, all we have to do 81 81 00:03:48,400 --> 00:03:52,420 is copy the option name, which is what I have right here 82 82 00:03:53,430 --> 00:03:57,150 and type set, followed by the option 83 83 00:03:57,150 --> 00:03:58,820 that you want to modify. 84 84 00:03:58,820 --> 00:04:03,500 And in my case it's called arp.spoof.fullduplex. 85 85 00:04:03,500 --> 00:04:05,923 And I wanna set this to true. 86 86 00:04:07,410 --> 00:04:09,430 So very, very simple. 87 87 00:04:09,430 --> 00:04:11,850 And like I said, you can use this command 88 88 00:04:11,850 --> 00:04:16,170 to change any option in any module in Bettercap. 89 89 00:04:16,170 --> 00:04:18,170 All you have to do is type, set, 90 90 00:04:18,170 --> 00:04:19,930 followed by the option name, 91 91 00:04:19,930 --> 00:04:22,363 followed by the value that you want to set. 92 92 00:04:23,390 --> 00:04:26,010 So I'm gonna hit enter and that's done. 93 93 00:04:26,010 --> 00:04:27,070 If you don't see errors, 94 94 00:04:27,070 --> 00:04:29,543 that means it got executed properly. 95 95 00:04:30,520 --> 00:04:34,470 The next option that I wanna change is the targets. 96 96 00:04:34,470 --> 00:04:36,030 So again, in the description, 97 97 00:04:36,030 --> 00:04:38,390 it's telling us that these are the targets 98 98 00:04:38,390 --> 00:04:41,430 that I want to run the attack against 99 99 00:04:41,430 --> 00:04:46,140 and I can use a coma if I wanted to target more than one IP 100 100 00:04:46,140 --> 00:04:47,313 at the same time. 101 101 00:04:48,150 --> 00:04:50,370 So again, just like what I did before, 102 102 00:04:50,370 --> 00:04:53,810 I'm gonna do set, followed by the option name, 103 103 00:04:53,810 --> 00:04:58,810 which is arp.spoof.targets. 104 104 00:04:59,360 --> 00:05:02,720 And you can actually use the tab to auto-complete. 105 105 00:05:02,720 --> 00:05:05,800 So if I just type T-A tab, 106 106 00:05:05,800 --> 00:05:08,203 it'll auto complete the targets for me. 107 107 00:05:09,240 --> 00:05:11,470 And after this I'm gonna put the value 108 108 00:05:11,470 --> 00:05:13,560 that I want to set this option to, 109 109 00:05:13,560 --> 00:05:15,900 which is the IP of my target 110 110 00:05:15,900 --> 00:05:19,930 and we can get this using net discover, using zen map 111 111 00:05:19,930 --> 00:05:22,720 or using the result that I got in here. 112 112 00:05:22,720 --> 00:05:26,490 After I ran the recon module, I did net.show 113 113 00:05:26,490 --> 00:05:27,880 and we got all of this, 114 114 00:05:27,880 --> 00:05:29,990 which is the list of all of the computers 115 115 00:05:29,990 --> 00:05:32,150 connected to the same network. 116 116 00:05:32,150 --> 00:05:35,500 And my target right now, is this particular device, 117 117 00:05:35,500 --> 00:05:37,960 the 10.0.2.7. 118 118 00:05:37,960 --> 00:05:41,623 This is my windows virtual machine right here. 119 119 00:05:43,560 --> 00:05:47,120 So I'm gonna put the IP 10.0.2.7. 120 120 00:05:48,440 --> 00:05:50,710 And again, we don't see any errors, 121 121 00:05:50,710 --> 00:05:55,660 which means that everything got executed as expected. 122 122 00:05:55,660 --> 00:05:57,810 Now, we're ready to run the tool. 123 123 00:05:57,810 --> 00:06:00,700 And again, based on the help menu that we got, 124 124 00:06:00,700 --> 00:06:05,700 we can do arp.spoof on to turn this module on. 125 125 00:06:05,930 --> 00:06:10,363 So we're gonna do arp.spoof on. 126 126 00:06:12,040 --> 00:06:14,700 And perfect, as you can see, we see no errors. 127 127 00:06:14,700 --> 00:06:18,280 It's telling us that the module is running. 128 128 00:06:18,280 --> 00:06:22,070 And if I do help, again, we're gonna get a list 129 129 00:06:22,070 --> 00:06:25,120 of all of the modules that are running right now. 130 130 00:06:25,120 --> 00:06:29,313 And as you can see, we can see that ARP spoofing is on. 131 131 00:06:30,690 --> 00:06:33,860 Also, it is very important that you make sure 132 132 00:06:33,860 --> 00:06:38,520 that the net.probe and the net.recon are running. 133 133 00:06:38,520 --> 00:06:40,350 We did this in the previous lecture. 134 134 00:06:40,350 --> 00:06:42,093 That's why I didn't do it now. 135 135 00:06:43,260 --> 00:06:45,580 So right now, Bettercap should be doing 136 136 00:06:45,580 --> 00:06:48,070 what ARP spoofing was doing, 137 137 00:06:48,070 --> 00:06:51,150 fooling both the router and the target device 138 138 00:06:51,150 --> 00:06:54,380 and putting me in the middle of the connection 139 139 00:06:54,380 --> 00:06:56,250 as shown here. 140 140 00:06:56,250 --> 00:06:59,760 So, let's go to the windows machine right here. 141 141 00:06:59,760 --> 00:07:04,660 And I'm gonna do arp-a and as you can see, 142 142 00:07:04,660 --> 00:07:07,430 the routers MAC address right here 143 143 00:07:07,430 --> 00:07:11,690 is the same as the MAC address for this device, 144 144 00:07:11,690 --> 00:07:14,410 which is the 10.0.2.15. 145 145 00:07:14,410 --> 00:07:17,460 And if I go back here to the Kali machine 146 146 00:07:17,460 --> 00:07:22,460 and do ifconfig, you'll see this is the same MAC address 147 147 00:07:23,400 --> 00:07:28,400 as the MAC address of the Kali ETH0 interface. 148 148 00:07:30,150 --> 00:07:33,800 So basically, what this means is this windows machine, 149 149 00:07:33,800 --> 00:07:37,010 every time it wants to send something to the router, 150 150 00:07:37,010 --> 00:07:40,130 it'll send it to the Kali machine. 151 151 00:07:40,130 --> 00:07:45,130 And because we set the full duplex option on, in Bettercap, 152 152 00:07:45,160 --> 00:07:48,110 the router also thinks that this Kali machine 153 153 00:07:48,110 --> 00:07:50,210 is the target machine. 154 154 00:07:50,210 --> 00:07:53,390 Therefore, anytime it needs to send a response 155 155 00:07:53,390 --> 00:07:55,240 to the windows machine, 156 156 00:07:55,240 --> 00:07:58,323 it'll actually send it to Bettercap right here. 157 157 00:07:59,330 --> 00:08:03,750 And like I said before, this means every username, password, 158 158 00:08:03,750 --> 00:08:07,600 URL, anything the target computer sends or receives 159 159 00:08:07,600 --> 00:08:09,850 will have to go through the Kali machine 160 160 00:08:09,850 --> 00:08:13,870 where we're gonna be able to read it, modify it, or drop it. 161 161 00:08:13,870 --> 00:08:17,153 And I'm gonna walk you through that in the next lectures. 13939

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.