Description: Intercepting web traffic with malicious proxy through WPAD.
Author: Ares
Project homepage: sniff.su
Tags: wpad , sniffing , Intercepter-NG ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
nice dont know how i missed this video, when iv been testing over wifi i notice ovr wireshark browsers send wpad requests. I just had a hard time providing the wpad any idea how this is done manually?
found my answer
http://technet.microsoft.com/en-us/library/cc713344.aspx
nice