.

Cain & Abel v2.8 Released

<<

don

User avatar

Administrator
Administrator

Posts: 4226

Joined: Sun Aug 28, 2005 10:47 pm

Location: Chicago

Post Wed Oct 19, 2005 10:58 pm

Cain & Abel v2.8 Released

Read the new features list at http://www.oxid.it/index.html.
Download your free copy at http://www.oxid.it/cain.html.

In addition to Cain & Abel, Oxid also features the following tools:

  • IRS scans for IP restrictions set for a particular service on a Host. It combines "ARP Poisoning" and 'Half-Scan' techniques and tries totally spoofed TCP connections to the selected port of the Target. IRS is not a port Scanner but a 'valid source IP address' Scanner for a given service.
  • sTerm is a Telnet client with a unique feature. It can establish an entire bi-directional Telnet session to a target host never sending your real IP and MAC addresses in any packet. By using "ARP Poisoning", "MAC Spoofing" and "IP Spoofing" techniques sTerm can effectively bypass ACLs, Firewall rules and IP restrictions on servers and network devices. the connection will be done impersonating a Trusted Host.
  • cPfPc (Cisco PIX Firewall Password Calculator) produces the encrypted form of Cisco PIX enable mode passwords without the need to access the device.
  • ArpWorks is an utility for sending customized 'ARP announce' packets over the network. All ARP parameters, including the Ethernet Source MAC address (the phisical address of your network card) can be changed as you like. Other features are: IP to MAC resolver, subnet MAC discovery, host isolation, packets redirection, general IP confict.
  • CredDump is an utility that dumps passwords from Windows XP/2003 user's credential files and shows them in they're cleartext form.
  • Winrtgen is a graphical Rainbow Tables Generator that supports LM, FastLM, NTLM, MD2, MD4, MD5, SHA1, RIPEMD160, MySQL323, MySQLSHA1, CiscoPIX, SHA-2 (256), SHA-2 (384) and SHA-2 (512) hashes.

Share your experiences with Cain & Abel or any of the tools listed above by starting new topics.
CISSP, MCSE, CSTA, Security+ SME
<<

spyder2535

Newbie
Newbie

Posts: 1

Joined: Wed Dec 05, 2007 9:52 pm

Post Thu Dec 06, 2007 8:50 pm

Re: Cain & Abel v2.8 Released

I have seen a video tutorial on ARP poisoning with Cain and read Mao's flash tutorial.  In Mao's flash tutorial he talks about redirecting traffic from an outside LAN.  However, I cant find a tutorial that goes into more detail about it.  Can someone tell me if there is a tutorial somewhere that has a step by step of how to make Cain work outside of your own LAN?

Thanks,
spyder
<<

slimjim100

User avatar

EH-Net Columnist
EH-Net Columnist

Posts: 385

Joined: Wed Nov 08, 2006 12:50 pm

Location: Atlanta

Post Fri Dec 07, 2007 2:56 pm

Re: Cain & Abel v2.8 Released

You can not do this because ARP is layer2 and your subnet is the only place you can router MAC addresses. You can use some of the other features in Cain over the internet but not ARP poisoning. ARP poisoning will only work in a layer2 network. The only option to go past you own LAN is if Mao figures out how to get Winpcap to work in Able and allow remote installation of Able to relay the ARP info over other subnets.

Brian
CISSP, CCSE, CCNA, CCAI, Network+, Security+, JNCIA, & MCP
<<

Negrita

User avatar

Sr. Member
Sr. Member

Posts: 299

Joined: Sat Sep 10, 2005 5:45 pm

Location: /dev/null

Post Fri Dec 07, 2007 5:07 pm

Re: Cain & Abel v2.8 Released

slimjim100 wrote:You can not do this because ARP is layer2 and your subnet is the only place you can router MAC addresses.


This is incorrect. You evidently forgot about Multipoint Layer 2 MPLS VPNs (AToM). BTW does anyone here have experience in doing ARP poisining over MPLS?
CEH, CCSA NG/AI, NNCSS, MCP, MCSA 2003

There are 10 kinds of people, those that understand binary, and those that don't.
<<

slimjim100

User avatar

EH-Net Columnist
EH-Net Columnist

Posts: 385

Joined: Wed Nov 08, 2006 12:50 pm

Location: Atlanta

Post Fri Dec 07, 2007 7:29 pm

Re: Cain & Abel v2.8 Released

With MPLS or Metro Ethernet services it is true because it's a layer2 service by the ISP. smiler to a Layer2 VPN but the point I was trying to make was ARP poisoning works in the MAC domain your in unless you have a device to repeat or encapsulate the layer2 MAC addresses to forward them to the next network. Other issues you might see in an MPLS/Metro Ethernet service is being restricted by VLAN. I have requested Mao to find a remote (Able) solution to access other subnets with the ARP traffic and tables but to do this you will need some way to bounce or repeat the mac domain tables so Cain can alter them to force the traffic to you NIC.

Brian
CISSP, CCSE, CCNA, CCAI, Network+, Security+, JNCIA, & MCP

Return to Tools

Who is online

Users browsing this forum: No registered users and 1 guest

.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software