sudo aptget install iscdhcpserver configure the dhcp server a
This attack can be done by using (on Windows) a program that allows you to create the DHCP server, and on Linux you can use the dhcpd server. Besides all this, you also need to add a static default route to redirect all traffic to the Network Router (aka Gateway).
Here are the steps:
Start the Routing process on Kali
a. # echo “1” > /proc/sys/net/ipv4/ip_forward
Install the DHCP server
a. # sudo apt-get install isc-dhcp-server
Configure the DHCP server
a. # nano /etc/dhcp/dhcpd.conf
Add a (default) static route to your Router
a. # sudo ip route add default via 192.168.1.1
Start SSL Strip
Capture the traffic
How can we protect ourselves from a MITM attack?
Yes, there is a solution for all these attacks. In fact, several solutions, but I will tell you a relatively simple one that you can use from today. Its called VPN (Virtual Private Network) and it will encrypt your traffic without anyone (in the middle) being able to decrypt it.
Another solution applies to Network switches, namely DHCP Snooping or DAI (Dynamic ARP Inspection), which are different mechanisms to rely on certain devices in the network. And if someone wants to break this, then they will be penalized by excluding them completely from the network (closing the port directly from the switch).