Time for action – session hijacking over wireless
- Set up the test exactly as in the MITM attack lab. On the victim, let's fire up the browser and type in https://www.google.com. Let's use Wireshark to monitor this traffic. Your screen should resemble the following:
- Apply a Wireshark filter for DNS and, as we can see, the victim is making DNS requests for https://www.google.com:
- In order to hijack the browser session, we will need to send fake DNS responses that will resolve the IP address of https://www.google.com to the hacker machine's IP address ...
Get Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.