Interception of entered user data

CarderPlanet

Professional
Messages
2,552
Reaction score
712
Points
83
How do they intercept traffic and monitor user actions?

Hey! Everyone from time to time goes to cafes, restaurants, clubs and connects to free Wi-Fi networks. Have you ever wondered if someone is watching your actions while you are connected to this network? Today I will tell and show you how this happens.

0576f45a446587b674d5c.png


In general, there are many ways to do this, many are quite complex, but today we will analyze a rather simple method using WPAD. I think you know everything about this protocol, but just in case, I will say that it allows the user to discover caching services and successfully interact with them without any problems.

6014b65ef5c8ded51d5ae.png


Kali Linux is mainly used for the attack. By the way, it is not necessary to have a laptop with this operating system, it can be run on a smartphone without any problems.

He has a pretty good Responder tool. He imitates various services, he also successfully imitates WPAD, offers them to various users as a bonus.

Kali Linux has it by default. In order to get acquainted with the help screen, there is a switch - h.

857b9e4bdcd0f6200ed1c.png



It has an analysis mode, and to examine it, let's run:
Code:
responder -A

With this mode, the tool is launched in analysis mode. It is immediately clear from the name of the regime that it will precisely "observe", but will not transmit anything anywhere. And for those who want to see what requests are made by users connected to a certain network, this will help a lot.

ae34df7d2bbb34362c807.png


27bc72e24a69dc93cd7b5.png


Also this tool can be run to attack WPAD.
Code:
responder -I eth0 -wbF
  1. “W” - turns on the WPAD server;
  2. “B” - activates the HTTP authentication mode;
  3. “F” - Requests WPAD authentication.
Responder attacks WPAD using the “Force Basic Authentication” feature, that is, as we said, it prompts different users to log in when they try to open web pages. And the attacker receives all the data entered by them in a ready-made form.

30e499f4512ef45410e8d.png


44a16df9c18d97e05c377.png


Conclusions
Using WPAD, any attacker can get your data without much effort.
Even if you are using a secure connection, it is still possible to capture all your data, details and other valuable information through the URL.

We do not urge you to repeat these actions, you yourself are responsible for your actions.
The information is entertaining and published for informational purposes only. You can only use it for your own safety and protection.
 
Top