O'Reilly logo

Penetration Testing with Perl by Swizec Teller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

MitM

A MitM is a little more advanced than passively eavesdropping on a conversation. This attack entails the victim communicating to the attacker, who relays the data to the victim's intended recipient and vice versa. In doing so, a truly successful MitM attack happens when the attacker is completely transparent to the conversation and can listen to the entire conversation. This is a form of active intelligence gathering. If we are successful at this type of network manipulation, we should immediately capture all traffic for later analysis. If the target user is using end-to-end encryption, such as SSL for HTTP traffic credentials and other sensitive form data, we can attempt to use SSLStrip to read the traffic in plain text.

SSLStrip is an open ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required