Results 1 to 4 of 4

Thread: Understanding Man-In-The-Middle Attacks

  1. #1
    Just burned his ISO
    Join Date
    Nov 2010
    Posts
    3

    Default Understanding Man-In-The-Middle Attacks

    Hi everyone, a few instructors here at InfoSec Institute have put together a short presentation and video tutorial on how to perform a Man-In-The-Middle (MitM) attack. You can view the presentation that diagrams out how a MitM attack works:

    Man In The Middle – Demystified | *InfoSec Resources

    You can also view a how-to video tutorial that you can follow along with if you have a few virtual machines to play with on your local network:

    Video: Man-in-the-Middle

    In a pen test, it is important to learn how to do these attacks to intercept server to server communication, server to client communication, etc.

    Coming soon we will demonstrate how to perform a MitM attack against SSL encrypted sessions.

    Happy hacking!

    InfoSec Institute

  2. #2
    Junior Member
    Join Date
    Oct 2010
    Location
    TOTSE
    Posts
    28

    Default Re: Understanding Man-In-The-Middle Attacks

    Interesting and informative video, thanks! Beats a lot of the other tutorials out there.

  3. #3
    My life is this forum thorin's Avatar
    Join Date
    Jan 2010
    Posts
    2,629

    Default Re: Understanding Man-In-The-Middle Attacks

    You know what I've been hunting for and never found. An actual way to decrypt SSLv2 traffic or SSL traffic encrypted with weak (40bit) ciphers. Many tools (Nessus, etc) report these as issues but I've never actually seen any practical demonstration of the described weaknesses.
    I'm a compulsive post editor, you might wanna wait until my post has been online for 5-10 mins before quoting it as it will likely change.

    I know I seem harsh in some of my replies. SORRY! But if you're doing something illegal or posting something that seems to be obvious BS I'm going to call you on it.

  4. #4
    Super Moderator Archangel-Amael's Avatar
    Join Date
    Jan 2010
    Location
    Somewhere
    Posts
    8,012

    Default Re: Understanding Man-In-The-Middle Attacks

    Moved to a better section.
    To be successful here you should read all of the following.
    ForumRules
    ForumFAQ
    If you are new to Back|Track
    Back|Track Wiki
    Failure to do so will probably get your threads deleted or worse.

Similar Threads

  1. help needed with fakeAP and man in the middle
    By roonie in forum Beginners Forum
    Replies: 10
    Last Post: 08-31-2010, 01:59 PM
  2. man in the middle
    By halfdone in forum Beginners Forum
    Replies: 1
    Last Post: 02-11-2010, 10:23 PM
  3. man in the middle with ettercap?
    By kid protocol in forum OLD Newbie Area
    Replies: 13
    Last Post: 04-24-2009, 08:14 PM
  4. Thinkpad T40 KBD and Middle Mouse
    By phokur in forum OLD BT3beta NON-WORKING HARDWARE
    Replies: 1
    Last Post: 06-30-2008, 02:58 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •