![]() ![]() Kali Linux, live or installed(recommended).Since I suppose you already have this theoretical background (or not and just want to get into action), I continue with the requirements: For easier understanding of the concept, Wikipedia has stated it better than I ever will: link . You can intercept packets both ways or only one way. ![]() The answer is simple: you place yourself in the middle of the communication process, forwarding packets and acting as a gateway. The thing is, how you (the attacker) may intercept the communication in order to extract amount of info. The main point is, you have a wireless LAN or WAN communication between two computers (usually a server and a node). The whole concept of a MITM attack is relatively easy to comprehend. Second, let us explain what a MITM (Man-In-The-Middle) attack, aka MTM, MiM, MITMA etc is. Hello my fellas! Take a toast to my first actual post, first of all.
0 Comments
Leave a Reply. |