Description: SSL Man in the Middle Attack has grown to become one of the most common way of exploiting victims. This attack requires that the Hacker places himself in the middle of all communication happening between victim and another destination host. In order to do this on the wired side, ARP cache poisoning and traffic rerouting have been the most prevalent techniques used. On the wireless side hijacking Layer 2 and above is whole different game. Among the various techniques which can be used, the most common one seen in the wild is using a Honeypot. A wireless Honeypot is a Hacker controlled Access Point (generally a soft AP) which lures victims to connect to it. Once the victim connects to the Honeypot, the hacker has full control of the Internet traffic sent and received by the victim. In this video we will look at how a Hacker can setup a wireless Honeypot and do a SSL Man in the Middle Attack.<br><br><div style="width:425px;text-align:center" id="__ss_454402"><object style="margin:0px" width="425" height="355"><param name="movie" value="http://static.slideshare.net/swf/ssplayer2.swf?doc=sslmitmattackoverwireless-1212931292253520-9"/><param name="allowFullScreen" value="true"/><param name="allowScriptAccess" value="always"/><embed src="http://static.slideshare.net/swf/ssplayer2.swf?doc=sslmitmattackoverwireless-1212931292253520-9" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="425" height="355"></embed></object><div style="font-size:11px;font-family:tahoma,arial;height:26px;padding-top:2px;"><img src="http://static.slideshare.net/swf/logo_embd.png" style="border:0px none;margin-bottom:-5px" alt="SlideShare"/> | View | Upload your own</div></div> Links:<br><br>1. Man in the Middle Attack<br><br>2. SSL Man in the Middle Attack<br><br>3. Dnsspoof Basics<br><br>4. Delegate Proxy<br><br>
Tags: tools ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.