Jump to content

Newbie - As Man In The Middle With Pineapple


Rocuronium

Recommended Posts

Hello Everyone,

    Thanks in advance for taking the time to review my question I genuinely appreciate it. I'm very new to all this but I've gone head first into Linux books, video tutorials, kali, the list goes on. I just want to understand something and make sure my thought process is correct as I anxiously await my tools to arrive. "Man In The Middle" is not a specific attack but rather a method of access. Since all network traffic is being routed through the middle I can sniff packets for unsecured data, forward clients to spoofed websites (getting them to input an actual WPA password), and attempt to find machines on my network with exploits that I can try to SSH into for instance. These are just the few things I can think of off the top of my head that I'd be able to do as the man in the middle. I just want to be sure I'm understanding correctly and if there are any good tutorials or videos you specifically recommend I'd love to hear them. I just signed up for the full package at "The Cyber Mentor" and will be grinding his YouTube videos as well in my downtime while reading Linux books.

 

-Roc

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...