Man-in-the-Middle Detection Tryhackme Answers

Dive into the interactive TryHackMe room focused on Man-in-the-Middle (MITM) detection, where you’ll deploy virtual machines, launch real-world ARP/DNS spoofing attacks, and use packet capture tools like Wireshark to spot and analyse malicious interceptions.

MITMINCIDENT RESPONSEMETHODOLOGYDETECTIONTOOLSDEFENDER XDRTRYHACKME WRITEUPSTECHNOLOGYSECURITYPENETRATION TESTINGPHISHINGCREDENTIAL DUMPINGTRYHACKME WALKTHROUGHNETWORK DISCOVERYNETWORKINGTHREAT DETECTIONINFORMATION SECURITY (INFOSEC)TRYHACKME ANSWERSETHICAL HACKINGCYBERSECURITYTRYHACKMEOPEN-SOURCE TOOLSVULNERABILITIESENCRYPTIONS

Jawstar

10/21/20251 min read

Task 4 : Detecting ARP Spoofing

How many ARP packets from the gateway MAC Address were observed?
10
What MAC address was used by the attacker to impersonate the gateway?
02:fe:fe:fe:55:55
How many Gratuitous ARP replies were observed for 192.168.10.1?
2
How many unique MAC addresses claimed the same IP (192.168.10.1)?
2
How many ARP spoofing packets were observed in total from the attacker?
14

Task 5 : Unmasking DNS Spoofing

How many DNS responses were observed for the domain corp-login.acme-corp.local?
211
How many DNS requests were observed from the IPs other than 8.8.8.8?
2
What IP did the attacker’s forged DNS response return for the domain?
192.168.10.55

Task 6 : Spotting SSL Stripping in Action

How many POST requests were observed for our domain corp-login.acme-corp.local?
1
What's the password of the victim found in the plaintext after successful ssl stripping attack.
Secret123!

Task 7 : Conclusion & Room Wrap-up

In this room, we explored some common man-in-the-middle attacks chained together in a scenario and how to identify the footprints in the network traffic.
Please note that similar logs are placed in the mitm_network logs folder and pre-ingested into Splunk for you to try.
Some of the key concepts covered in this room are:
  • Detected by finding duplicate MAC addresses for different IPs in the ARP cache (arp -a) or by spotting in Wireshark.
  • DNS Spoofing: Unmasked by finding multiple, conflicting DNS responses.
  • SSL Stripping: Exposed by finding sensitive data, like passwords, being sent in plaintext over HTTP to websites that should be secure.