If MITM attacks on Android crashed your sweet dreams and raised your paranoia, it’s time to inflict you the final blow.
Imagine you’re communicating with your best friend. You don’t trust phones anymore. So you open your bag, pull out your PC and start chatting.
I’m sorry, any kind of traffic can be sniffed and analyzed: MITM IS EVERYWHERE.
That’s the core of the last class: Wireshark Network Analysis.
It can be easily used to analyze each packet that passes through the connected network card in promiscuous mode.
More important, given a list of packets captured somehow, it gives the user the ability to open it and search for useful information. It’s like playing the part of a detective (or a thief, just to be clear).
It was a pleasure having all of you during our lessons! Hope to see you in the future.
Stay tuned and happy hacking to everyone! ;-)
Ao(mgHZs1EATMNnEbf#rF'ig'FC/WuEaN[%CLqd4I/ ^ > ^
- What are those things…?
- Let’s encrypt some data with SSL / TLS.
- This is the handshake. Got it?
- Switch are very useful devices.
- Man in The Middle, explained by enriquez!
- enriquez showing how to use Wireshark.
- Capturing a flag inside network traffic: DONE.
- See you soon!