• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 876
  • Last Modified:

Man in the middle

hey everyone,
                            i want to know more about man in the middle attack. And for that i want to try (no worry, its only for educatinnal purposes). What i want do is the following. I'll start a chat program (written in Java) on the of my cpu at home. What i want to do is to intercept one message (ex : cpu1 sends hello to cpu2 via the chat program) and to change the content of the message so that cpu2 receive the message "bye" for example.

I've read a bit on this and i think all of this is called tcp hijacking but i can't find the right tool to do what i want to do.

Thanks for suggestion and help

have a nice day
0
Pascal_La_Dalle
Asked:
Pascal_La_Dalle
  • 2
  • 2
  • 2
  • +2
2 Solutions
 
mdolandCommented:
Depends on what OS you have. I have seen an old program called Juggernaut do it. Think its Linux. Pretty cool, but I think there are many alternatives.
0
 
mdolandCommented:
0
 
mnb93Commented:
Try:
http://www.google.com.au/search?q=packet+sniffing
I think thats what you want.
0
Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

 
Pascal_La_DalleAuthor Commented:
tx for your answers

1) on linux (fedora 3) or windows ...... it doesnt matter). I tried to install juggernaut but i`m having a hard time doing it.

2) tx for the link, i'll check the tools

3) paquet sniffing only allow me to see the traffic that is going by. I use a lot Ethereal, but that's not really what i want to do. I want to intercept the paquets and modify the data in it.

Again, tx for your answers

have a nice day
0
 
ahoffmannCommented:
> .. want to intercept the paquets ..
you need to have control somewhere in the middle (see your title:-)
either by intercepting the trafic with a proxy or by inserting a fake route/server/whatever somewhere
not simple i.g. ...
0
 
nader alkahtaniNetwork EngineerCommented:
0
 
Pascal_La_DalleAuthor Commented:
seems to be a nice tools ... tx for the tip.

But just one thing ... with the tool can i change the data of the packets i intercept, cause in the end, thats what i need to do

tx a lot
0
 
nader alkahtaniNetwork EngineerCommented:
If you meant that may cause problems then read FAQ for that tool
0
 
ahoffmannCommented:
> .. with the tool can i change the data of the packets i intercept,
I doubt it does what you asked for
0

Featured Post

Become an Android App Developer

Ready to kick start your career in 2018? Learn how to build an Android app in January’s Course of the Month and open the door to new opportunities.

  • 2
  • 2
  • 2
  • +2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now