Time for action – session hijacking over wireless

  1. Set up the test exactly as in the MITM attack lab. On the victim, let's fire up the browser and type in https://www.google.com. Let's use Wireshark to monitor this traffic. Your screen should resemble the following:
    Time for action – session hijacking over wireless
  2. Apply a Wireshark filter for DNS and, as we can see, the victim is making DNS requests for https://www.google.com:
    Time for action – session hijacking over wireless
  3. In order to hijack the browser session, we will need to send fake DNS responses that will resolve the IP address of https://www.google.com to the hacker machine's IP address ...

Get Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.