Kali Linux 2017 Wireless Penetration Testing for Beginners Season 1 Episode 14 MitM Attacks
- February 27, 2018
- 10 min
So we are connected to our target, what fun can we do? The first thing we are able to do is perform a MitM attack in which puts us in between 2 people talking to each other. This allows us to intercept their conversation to inquire personal information.