How to install mitm6

 

What is mitm6?


mitm6 is a pentesting tool that exploits the default configuration of Windows to take over the default DNS server. It does this by replying to DHCPv6 messages, providing victims with a link-local IPv6 address and setting the attackers host as default DNS server. As DNS server, mitm6 will selectively reply to DNS queries of the attackers choosing and redirect the victims traffic to the attacker machine instead of the legitimate server.


reference: https://github.com/dirkjanm/mitm6



Dependencies and installation

mitm6 is compatible with both Python 2.7 and 3.x. You can install the requirements for your version with "pip install -r requirements.txt". In my case, I have to use the ff command "pip3 install" as "pip install -r requirements.txt" does not work for me.


To start with, Go to Google search and look for "github mitm6" then clone the repository.

┌──(root㉿kali)-[/opt]

└─# git clone https://github.com/dirkjanm/mitm6.git   






Dependencies and installation.


┌──(root㉿kali)-[/opt/mitm6]

└─# pip3 install .





Once installation is finish, mitm6 will be available as a command line program called mitm6. you can run the ff. command to check for the usage.


Since the tool uses raw packet capture with Scapy, it should be run as root. mitm6 should detect your network settings by default and use your primary interface for its spoofing. The only option you will probably need to specify is the AD domain that you are spoofing. For advanced tuning, the following options are available:



┌──(root㉿kali)-[/opt/mitm6]

└─# mitm6 -h






Comments

Popular posts from this blog

GOAD Active Directory LAB Setup on a Windows host

My Short Analysis - Redline Infostealer

Regular expressions - Notes