Wireless Eavesdropping using MITM
In the previous lab, we learned how to create a setup for MITM. Now, we will take a look at how to do Wireless Eavesdropping with this setup.
The whole lab revolves around the principle that all the victim's traffic is now routed through the attacker's computer. Thus, the attacker can eavesdrop on all the traffic sent to and from the victim's machine wirelessly.