Session hijacking over wireless
One of the other interesting attacks we can build on top of MITM is application session hijacking. During an MITM attack, the victim's packets are sent to the attacker. It is now the attacker's responsibility to relay this to the legitimate destination and relay the responses from the destination to the victim. An interesting thing to note is that, during this process, the attacker can modify the data in the packets (if unencrypted and unprotected from tampering). This means he can modify, mangle, and even silently drop packets.
In this next example, we will take a look at DNS hijacking over wireless using the MITM setup. Then, using DNS hijacking, we will hijack the browser session to https://www.google.com.