Credential Harvesting

When a client connects to our malicious access point, the messages file we are tailing will show us when an IP address is handed out. This is our cue to switch back to msfconsole to see what is happening. Here, we see that a client connects and is assigned an IP address:

Apr  2 15:07:34 bt dhcpd: DHCPDISCOVER from 00:17:9a:b2:b1:6d via at0
Apr  2 15:07:35 bt dhcpd: DHCPOFFER on 10.0.0.100 to
 00:17:9a:b2:b1:6d (v-xp-sp2-bare) via at0
Apr  2 15:07:35 bt dhcpd: DHCPREQUEST for 10.0.0.100 (10.0.0.1) from 00:17:9a:b2:b1:6d
    (v-xp-sp2-bare) via at0
Apr  2 15:07:35 bt dhcpd: DHCPACK on 10.0.0.100 to 00:17:9a:
b2:b1:6d (v-xp-sp2-bare) via at0

The first thing our target does is open an email client. Karmetasploit is waiting, as shown here:

[*] DNS 10.0.0.100:1049 XID 45030 (IN::A time.windows.com)
  [*] DNS 10.0.0.100:1049 XID 47591 (IN::A pop3.securemail.com)
 [*] POP3 LOGIN 10.0.0.100:1102 bsmith / s3cr3tp4s5

The POP3 server configured by Metasploit intercepts the target’s email username and password at , because all DNS requests are intercepted by the DNS server that Karmetasploit set up for us.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset