Most famously, Wireshark, but also tcpdump, dsniff, and a handful of others.
There are a number of tools that will enable you to do this. First, sniffing is the act of grabbing all of the traffic that passes you over the wired or wireless communication. The Art of Sniffingīefore we embark on a MitM attack, we need to address a few concepts. In this ' Hack Like a Pro' tutorial, I'll show you a very simple way to conduct a MitM attack and capture unencrypted traffic.
This allows us to see and read all of the communication (passwords, confidential information, etc.), as well as alter it, if need be. It should be totally transparent to both the client and the server with neither suspecting they're connected to anything or anyone but who they expect. For those of you who've never heard of one, it's simply where we, the hacker, place ourselves between the victim and the server and send and receive all the communication between the two. Many of you have probably heard of a man-in-the-middle attack and wondered how difficult an attack like that would be.