Chapter 5: Man in the Middle Attacks
In the previous chapter, we learned about network scanning. Network scanning is a part of information gathering that allows users to find hosts in a local network. In this chapter, we will learn how to utilize this information to attacks victims on the local network. We will cover the following topics in this chapter:
- Why do we need ARP?
- Building an ARP spoof program
- Monitoring traffic
- Encrypted traffic
- Restoring ARP tables manually
- Decrypting the network traffic