MITM Attack or How to get Access to Your Neighbour's Gmail
I will try to explain the two main methods of getting the victim's access to sites he visits (even those protected by HTTPS). The methods I will talk about are based on MITM (Man in the middle) attack. Both methods require you to connect to the victim's wifi beforehand (prerequisite). 1. Listen to all traffic from the devices on your network to the router. 2. Cheat the router and the victim to pass all of their traffic through you (as a proxy , thus gaining access to all traffic). Listen The first method (listening mode) is more non-detectable as you don't actually disturb the victim or the router, you just listen to the packets of traffic as they go through the air. This method can be done using two main modes: I. Promiscuous mode - Which is a mode you can use even on windows OS, and can be enabled on many network devices. This mode is not recommended ever using as it has lots of limitations, the most prominent one is that it can listen to traffic only on non-e...