Description: SSL Man in the Middle Attack has grown to become one of the most common way of exploiting victims. This attack requires that the Hacker places himself in the middle of all communication happening between victim and another destination host. In order to do this on the wired side, ARP cache poisoning and traffic rerouting have been the most prevalent techniques used. On the wireless side hijacking Layer 2 and above is whole different game. Among the various techniques which can be used, the most common one seen in the wild is using a Honeypot. A wireless Honeypot is a Hacker controlled Access Point (generally a soft AP) which lures victims to connect to it. Once the victim connects to the Honeypot, the hacker has full control of the Internet traffic sent and received by the victim. In this video we will look at how a Hacker can setup a wireless Honeypot and do a SSL Man in the Middle Attack.<br><br><div style="width:425px;text-align:center" id="__ss_454402"><object style="margin:0px" width="425" height="355"><param name="movie" value="http://static.slideshare.net/swf/ssplayer2.swf?doc=sslmitmattackoverwireless-1212931292253520-9"/><param name="allowFullScreen" value="true"/><param name="allowScriptAccess" value="always"/><embed src="http://static.slideshare.net/swf/ssplayer2.swf?doc=sslmitmattackoverwireless-1212931292253520-9" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="355"></embed></object><div style="font-size:11px;font-family:tahoma,arial;height:26px;padding-top:2px;"><img src="http://static.slideshare.net/swf/logo_embd.png" style="border:0px none;margin-bottom:-5px" alt="SlideShare"/> | View | Upload your own</div></div> Links:<br><br>1. Man in the Middle Attack<br><br>2. SSL Man in the Middle Attack<br><br>3. Dnsspoof Basics<br><br>4. Delegate Proxy<br><br>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Thanks Vivek :-)
Wouldn't it be better just to use sslstrip?
Thanks Vivek so cool
Thanks a lot, vivek! Keep up the good work!
Great tutorials...Great guy!!! Hurraaahh for Vivek !
Need some very urgent help
After creating the softAP and setting up the bridge and everything
When i connect my Client (cellphone) the airbase ng shows a message but my phone keeps me showing "OBTAINING IP ADDRESS" and does not work, It doesnot even give the APIPA address ,
thank you vivek
Hi, I do everything you teach but when i press i try to intercept the connection is lost ...if i change the intercept to off all devices navigating fine...any suggestion?
solved
Seems you have a problem with some HTML in the description of the video.