O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

How to do it...

In order to perform a man-in-the-middle attack, we need to bring together a few tools and techniques both new and old. With that being said, let's get started.

One thing to focus on in this attack is that we will be using multiple Terminal windows in Kali at once. In fact, in this particular recipe, we will be using three simultaneous Terminal windows with utilities running, each performing a separate part of the process. So, remember to keep your focus and pay attention to which window you're supposed to be in during this recipe.

Keep in mind that in this book, as well as in real life, you're going to find yourself in numerous situations where you're running more than one Terminal window at once. This is generally because ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required