Linux

MITM Part 2 - Scan & Attack

This is the second part in our series of security/penetration testing/ethical hacking articles, continuing where we left off in part 1. This will be a slightly longer post, but stick with it and you’ll see just how easy it is. Introduction In this part of the series, we’re going to use our Kali based attacker’s machine to scan the local network and find our Windows target. We’ll then carry out an ARP Poisoning based MITM attack against it as we explained in part 1.

Continue reading

MITM Part 1 - Never Trust The Network

This is the first in a series of security/penetration testing/ethical hacking articles. It won’t be super technical and should be easy to follow for most people, but if you’re stuck anywhere just shout in the comments and i’ll do my best to help. Introduction A short while ago, Google and Mozilla announced that they would be starting to show more prominent warnings in Chrome and Firefox when visiting sites over HTTP and not HTTPS, particularly if those sites ask for passwords or credit card details.

Continue reading