Understanding Man-In-The-Middle Attacks

Viewing 1 reply thread
  • Author
    Posts
    • #5753
      infoseci
      Participant

      Hi everyone, a few instructors here at InfoSec Institute have put together a short presentation and video tutorial on how to perform a Man-In-The-Middle (MitM) attack. You can view the presentation that diagrams out how a MitM attack works:

      http://resources.infosecinstitute.com/man-in-the-middle-demystified/

      You can also view a how-to video tutorial that you can follow along with if you have a few virtual machines to play with on your local network:

      http://resources.infosecinstitute.com/video-man-in-the-middle-howto/

      In a pen test, it is important to learn how to do these attacks to intercept server to server communication, server to client communication, etc.

      Coming soon we will demonstrate how to perform a MitM attack against SSL encrypted sessions.

      Happy hacking!

      InfoSec Institute

    • #36110
      putosusio
      Participant

      @infoseci wrote:

      Coming soon we will demonstrate how to perform a MitM attack against SSL encrypted sessions.

      … do I smell SSLStrip?

Viewing 1 reply thread
  • You must be logged in to reply to this topic.

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?