Wireless Eavesdropping using MITM

In the previous lab, we learned how to create a setup for MITM. Now, we will take a look at how to do Wireless Eavesdropping with this setup.

The whole lab revolves around the principle that all the victim's traffic is now routed through the attacker's computer. Thus, the attacker can eavesdrop on all the traffic sent to and from the victim's machine wirelessly.

Get Kali Linux Wireless Penetration Testing : Beginner's Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.