Hacking the next generation

Page 99

Figure 3-4. SSH session captured by a packet sniffer

Figure 3-6. Warning message the victim sees once she connects to the SSH server, explaining that she previously connected to the SSH server and will receive a security host key mismatch warning from her SSH client

Figure 3-5. Attacker selecting the gateway and all the hosts on the adjacent network

In the case of the victim using an SSH client such as PuTTy, all that stands between the attacker intercepting valid credentials on the server is the victim clicking Yes in the dialog box shown in Figure 3-6. When the victim clicks Yes, she accepts the attacker’s Abusing ARP | 83


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.