I recently watched this video on YouTube: ARP Poisoning | Man-in-the-Middle Attack by CertBros
Does this method also work as in the common case, when the MAC address has been spoofed, if an attacker wanted an extra layer of concealment? Also, ARP Poisoning MITM with a force disconnect kind of attack to intercept TLS key generation communications and create the new key at the same time as the target system; is that possible?
Any tutorial-like reads to test the procedures out, if any of the above are feasible, are most welcome. 😁
Disclaimer: I am a university student, self-studying NetSec on my free time. My interests are completely educational, with a professional (legal) end. My current skills are beyond a beginner's, but below average (in my opinion). I do have a homelab set-up. (I wanted to have everuthing in the clear, so that only productive comments may be found below. Thank you all in advance!)
[link] [comments]
from hacking: security in practice https://ift.tt/3FDNSwh
Comments
Post a Comment