Get full access to Hands-On Penetration Testing with Kali NetHunter and 60K+ other titles, with a free 10-day trial of O'Reilly.
There are also live events, courses curated by job role, and more.
One technique a penetration tester can use to ensure they are able to capture victim traffic is to perform an MITM attack. Let’s imagine there are two people on a wireless network, Alice and Bob. They both wish to exchange some messages across the network. However, there is a pentester whose task is to observe and capture network traffic.
Alice and Bob connect their mobile device to the wireless router or access point (AP) and begin to communicate. The wireless router is the intermediary device that will handle all their traffic forwarding:
Using arpsoof, the Pentester is able to spoof the media access control (MAC) address of the .
Get Hands-On Penetration Testing with Kali NetHunter now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.