Let’s introduce you all to a popular tool with the name Ettercap. A hacker may use the software listed below: He can also monitor the traffic between the users. He can sniff packets and alter them as well. The attacker establishes a secure connection on the direct connection between the sender and receiver. This activity is done so perfectly that both the sender and receiver are unaware of this and think that they are talking to each other directly. Man-In-The-Middle Attack: It is a form of active attack where the attacker makes a connection between the sender and receiver. But let’s just consider that we are not one of them. As a penetration tester or security personnel, one should know about MITM or Man In The Middle attacks. Have you ever heard about MITM? No, so let me give you a brief about it. So before talking about Ettercap, its installation, and workflow, let’s talk about the category in which it falls.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |