Rocuronium Posted December 3, 2021 Share Posted December 3, 2021 Hello Everyone, Thanks in advance for taking the time to review my question I genuinely appreciate it. I'm very new to all this but I've gone head first into Linux books, video tutorials, kali, the list goes on. I just want to understand something and make sure my thought process is correct as I anxiously await my tools to arrive. "Man In The Middle" is not a specific attack but rather a method of access. Since all network traffic is being routed through the middle I can sniff packets for unsecured data, forward clients to spoofed websites (getting them to input an actual WPA password), and attempt to find machines on my network with exploits that I can try to SSH into for instance. These are just the few things I can think of off the top of my head that I'd be able to do as the man in the middle. I just want to be sure I'm understanding correctly and if there are any good tutorials or videos you specifically recommend I'd love to hear them. I just signed up for the full package at "The Cyber Mentor" and will be grinding his YouTube videos as well in my downtime while reading Linux books. -Roc Quote Link to comment Share on other sites More sharing options...
dark_pyrro Posted December 3, 2021 Share Posted December 3, 2021 Is this a general MITM question or specific to the Pineapple (since it's posted in that part of the forum)? Quote Link to comment Share on other sites More sharing options...
Rocuronium Posted December 4, 2021 Author Share Posted December 4, 2021 21 hours ago, dark_pyrro said: Is this a general MITM question or specific to the Pineapple (since it's posted in that part of the forum)? Both? I'm waiting for my Pineapple to arrive but it would be a man in the middle. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.