Chapter 8. Man in the Middle Attacks
In this chapter, we will cover:
Setting up a spoofing attack with Ettercap
Being the MITM and capturing traffic with Wireshark
Modifying data between the server and the client
Setting up an SSL MITM attack
Obtaining SSL data with SSLsplit
Performing DNS spoofing and redirecting traffic