How to do it...

In order to perform a man-in-the-middle attack, we need to bring together a few tools and techniques both new and old. With that being said, let's get started.

One thing to focus on in this attack is that we will be using multiple Terminal windows in Kali at once. In fact, in this particular recipe, we will be using three simultaneous Terminal windows with utilities running, each performing a separate part of the process. So, remember to keep your focus and pay attention to which window you're supposed to be in during this recipe.

Keep in mind that in this book, as well as in real life, you're going to find yourself in numerous situations where you're running more than one Terminal window at once. This is generally because ...

Get Kali Linux Wireless Penetration Testing Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.