![]() ![]() I will show you in the next section how you can perform this attack. Now You can understand Kali machine is sitting silently and intercept the data between the communication of Windows and Ubuntu machine. Kali machine forward data to Windows machine and Windows machine thing Kali machine is a Ubuntu machine. ![]() Ubuntu machine thinks data is coming from the window machine and giving reply to the Kali machine. Attacker machine gets the data from the Windows and forward to the Ubuntu machine and told to ubuntu, I am a Windows machine. Kali Linux machine attack on the windows machine and told them that I am a window machine, and it trusts on this attack and sends the data to the Kali Linux machine. The scenario of Man in The Middle Attack : I have set up a virtual lab for the demonstration where one is window machine another is Ubuntu machine and the attacker machine is Kali Linux. Man in the middle attack allows to the hacker to intercept the data between two parties it may be server and client or client to Client or server to server. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |