-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Kali Linux Wireless Penetration Testing Beginner???s Guide
By :

One of the other interesting attacks we can build on top of MITM is application session hijacking. During an MITM attack, the victim's packets are sent to the attacker. It is now the attacker's responsibility to relay this to the legitimate destination and relay the responses from the destination to the victim. An interesting thing to note is that, during this process, the attacker can modify the data in the packets (if unencrypted and unprotected from tampering). This means he can modify, mangle, and even silently drop packets.
In this next example, we will take a look at DNS hijacking over wireless using the MITM setup. Then, using DNS hijacking, we will hijack the browser session to https://www.google.com.
Change the font size
Change margin width
Change background colour