From the course: Ethical Hacking: Session Hijacking

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Hijacking a Telnet session

Hijacking a Telnet session - Linux Tutorial

From the course: Ethical Hacking: Session Hijacking

Start my 1-month free trial

Hijacking a Telnet session

While much of the internet runs through web sessions, some of the earlier internet protocols which run directly on TCP and UDP are of significant interest to attackers. It's useful therefore to understand how these protocols can be hijacked at a network level. One of the tools we can use to do TCP session hijacking is Shijack, shown here at the Packet Storm Security site. I've already downloaded and unzipped this tool so let's get started and look at how we might hijack a telnet session. I'll run this attack from Kali so I've got a terminal open, ready to go. The first thing I need to do is poison the local network. I could do that on a command line using the ARP spoof tool, but I quite like the Ettercap graphical utility. I'll start up Ettercap using the minus g switch to run it in graphical mode. Ettercap starts up and we can see the main screen. I'll select sniff and unified sniffing, and I'll accept etx0. I'll now select hosts and scan for hosts. Okay, we've got a list of hosts…

Contents