Description: Dsniff is a suit of tools for auditing the network and penetration testing. We can use this tool for passive monitoring a network for some important data (passwords, e-mail, files, etc.). Other tool available are arpspoof, dnsspoof, and macof which intercept the network traffic normally unavailable to an attacker.This suit also contains sshmitm and webmitm. These are used to perform active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions.
Please go to http://monkey.org/~dugsong/dsniff/faq.html#How%20do%20I%20sniff%20in%20a%20switched%20environment for further information regarding dsniff
This video is simple demo of dsniff suit. Using different tools of this suit "monkey-in-the-middle-attack" is performed.
Source : livehacking from Youtube.
Tags: dsniff ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
One important thing is, we can only arpspoof hosts on the same subnet as our attacking machine.
Dsniff package relies on several additional third-party packages: BerkelyDB,OPenssl,libpcap.
I love this tool for hijacking HTTPS Connections :)
Ettercap is Best choice for Man in the middle attack.
good content. thanks