Summary

The first section of the chapter was about the MITM framework, which can be used for one of the most powerful attacks we can perform on a network. We performed a MITM attack using arpspoof, we bypassed HTTPS, we indulged in session hijacking, we looked at DNS-spoofing, we saw keyloggers, and we covered code injection.

Later, we learned about the Wireshark tool, which is a very effective tool for gathering information about clients by analyzing the packets that are sent in and out through a particular target. It lets users decode the information it carries. We learned the basics of how to use it, and we also learned how to apply and analyze a few filters.

The next chapter covers the ARP poisoning attack, as well as how to detect and prevent this attack. We will be using Wireshark for detection. 

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.171.12