Jump to content

Man In The Middle Editing Websites


BigFatBarny

Recommended Posts

If doing a MITM attack, you essentially control what is being passed back and forth to the end user. You could then swap out websites and redirect them to other sites, or even using something like ettercap, change all the images on the sites they visit or worse, phish their logins and passwords by impersonating legitimate sites using something like SET to do the cloning for you in real time..

Once you control their connection, its pretty much limitless control unless they encrypt their traffic. Also know that it is possible to strip SSL from their connection as well, so don't think https alone will save you.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...