A MitM is a little more advanced than passively eavesdropping on a conversation. This attack entails the victim communicating to the attacker, who relays the data to the victim's intended recipient and vice versa. In doing so, a truly successful MitM attack happens when the attacker is completely transparent to the conversation and can listen to the entire conversation. This is a form of active intelligence gathering. If we are successful at this type of network manipulation, we should immediately capture all traffic for later analysis. If the target user is using end-to-end encryption, such as SSL for HTTP traffic credentials and other sensitive form data, we can attempt to use SSLStrip to read the traffic in plain text.

SSLStrip is an open ...

Get Penetration Testing with Perl now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.