Learn Man in the Middle Attacks from Scratch [Video]
- FREE Subscription Read for free
- $54.99 Video Buy
- $12.99 Video + Subscription Buy
-
What do you get with a Packt Subscription?
- Instant access to this title and 7,500+ eBooks & Videos
- Constantly updated with 100+ new titles each month
- Breadth and depth in over 1,000+ technologies
-
Free ChapterIntroduction
-
Preparation
-
The Basics of Networks
-
Performing Man in the Middle Attacks
- Introduction
- Man in the Middle Attack Explained
- Gathering Information about the Connected Clients
- Gather Detailed Information about the Clients
- MITM Attack Using (ARPspoof)
- Capturing Login Credentials
- Bypassing SSL Certificate
- Redirect Any Client to Any Website
- Stealing the Cookies
- Capture a Screenshot from the Target Browser
- Injecting a Keylogger into the Target Webpage
- Capturing Images from Network Traffic
- Injecting HTML File and Flipping the Images in the Target Browser
- Injecting JavaScript URL and Hooking the Clients with BeEF
- Stealing the Target Accounts with BeEF
- Having Fun with BeEF
-
Hacking Connected Clients
-
Detection and Security
In this course, you will learn how to set up your Kali Linux 2.0 lab environment properly. In addition to that, you will learn how devices communicate with each other. Lastly, you will learn the best out of this course, which is the Man in the Middle attacks.
This course is divided into the following four sections:
- Preparation: In this section, you will learn how to download and set up the latest version of Kali Linux as a virtual machine or as your main OS. This helps you create your own safe hacking lab environment.
- Network basics: Here you will learn the basics of networks that will help you understand what should be done before network security testing.
- MITM attack: In this section, you will learn how to perform man-in-the-middle attacks and what post-modules can be carried out on the target OS. Modules such as playing music on the target OS, stealing credentials, and many more. You will even learn how to gain full access to the connected devices.
- Protecting yourself against these attacks: After learning MITM attacks, it is time to learn how to protect your OS against all the previously mentioned attacks.
By the end of the course, you will be able to perform MITM attacks on the target network and fully control all the connected computers. You will be able to protect yourself from MITM attacks.
- Publication date:
- February 2022
- Publisher
- Packt
- Duration
- 2 hours 54 minutes
- ISBN
- 9781803243245