1

Versions:

  • Host OS: Windows 10
  • Virtual box: 5.0.10 r104061
  • VM1: Kali Linux 2.0.0
  • VM2: Ubuntu 15.04

I have two VMs that I'm practicing penetration testing on. I'm trying to create a man in the middle attack so that my Kali VM can use Wireshark to see all the traffic of my Ubuntu VM. The problem is that, without even doing anything, I can already see all the traffic from my Ubuntu VM on my Kali VM. Here are some of my questions:

  1. Is this because I'm using one WiFi adapter? Would I need more of them?
  2. Is it ok if both VMs are using the eth0 interface? They currently are.
  3. The network adapters for both VMs are configured like so: Network settings for both VMs. NatNetwork is just a NAT network that I created with the default settings. Do these settings look ok?
3
  • I'm not certain that it's possible to test this in VMware. VMware would need to emulate a switch (otherwise known as a bridge) in order for you to NOT see the traffic in the first place. I know VMware has virtual switches, but I think they may be smart enough to thwart the types of attacks you have in mind (since they know which MACs should be behind which ports.) I'd try physical hardware. Or VMs on two laptops connected through a physical switch. (And I would use bridged mode, not NAT.)
    – mpontillo
    Commented Dec 15, 2015 at 6:30
  • check out the promiscuos mode flag
    – Lenniey
    Commented Dec 15, 2015 at 8:59
  • @Mike, I think you are correct. I configured the network of my Kali VM to be a bridged adapter, and then I used a separate laptop connected to the same wireless access point. My traffic from my laptop was hidden from the Kali VM until I performed my attack. If you would like, put your comment in an answer, and I'll accept it. Commented Dec 16, 2015 at 6:11

1 Answer 1

0

I'm not certain that it's possible to test this in VMware. VMware would need to emulate a switch (otherwise known as a bridge) in order for you to NOT see the traffic in the first place. I know VMware has virtual switches, but I think they may be smart enough to thwart the types of attacks you have in mind (since they know which MACs should be behind which ports.) I'd try physical hardware. Or VMs on two laptops connected through a physical switch. (And I would use bridged mode, not NAT.)

You must log in to answer this question.

Not the answer you're looking for? Browse other questions tagged .