CEH

(Jeff_L) #1

298 Chapter 12 ■ Session Hijacking


E XE RC I S E 12 .1

Performing an MITM Attack

In this exercise, you’ll learn the fundamentals of an MITM attack. This demonstration will
help you understand the background processes at work. For this demo you will have three
client systems; you’ll be using Windows XP, Windows 7, and Backtrack. Let’s take a look.


  1. First step, you need to throw a little traffic on the wire. You will use a continuous ping
    from one target host to another so you can see the redirection of traffic. Let’s get that
    going on the Windows 7 client and direct it to the Windows XP client.

  2. Next pull up your sniffer on Backtrack to ensure you are in position to capture all traffic
    and perform your MITM attack.

Free download pdf