- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 199字
- 2021-07-02 12:38:26
The MITM framework
A man-in-the-middle (MITM) framework of tools and utilities is used when performing all MITM attacks on a network. A MITM attack is when a hacker sits between the victim and another device, such as the default gateway to the internet. The intention of the attack is to intercept all traffic along the path. Looking at the following diagram, all traffic from the PC that is intended to go to the internet which is supposed to be sent directly to the router (default gateway) is indicated by the top arrow. However, with an attacker on the network, they are able to trick the victim's PC into thinking the attacker's machine is now the router (default gateway) and tricking the router into believing the attacker's machine is the PC:

It’s a penetration tester’s powerhouse. Some of its features are key-logging, address resolution protocol (ARP) cache poisoning attacks, spoofing, and SSL stripping attacks using the SSLStip+ feature. The following is the main window of the MITM framework on NetHunter:

Swiping across on the right, you'll encounter another section, Spoof Settings, which will allow a penetration tester to easily execute an MITM attack on a network:

- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實錄
- 黑客攻防入門秘笈
- 計算機網(wǎng)絡(luò)安全技術(shù)研究
- 情報驅(qū)動應(yīng)急響應(yīng)
- 網(wǎng)絡(luò)安全設(shè)計、配置與管理大全
- 解密數(shù)據(jù)恢復(fù)
- 互聯(lián)網(wǎng)企業(yè)安全高級指南
- 編譯與反編譯技術(shù)實戰(zhàn)
- 黑客攻擊與防范實戰(zhàn)從入門到精通
- 網(wǎng)絡(luò)空間安全法律問題研究
- 網(wǎng)絡(luò)安全監(jiān)控實戰(zhàn):深入理解事件檢測與響應(yīng)
- 信息組織
- 企業(yè)安全建設(shè)入門:基于開源軟件打造企業(yè)網(wǎng)絡(luò)安全
- 惡意軟件、Rootkit和僵尸網(wǎng)絡(luò)