MITM Attack Using Windows at 2018
A year ago I wrote about my first stab at MITM attacks . In this post I want to focus on MITM attacks using windows only tools. What is MITM Attack? A M an I n T he M iddle attack is an attack where the attacker is connected to the same network as the victim while positioning himself between the victim and the router thus makes himself a sort of a proxy while grabbing all of the network packets on the fly with the possibility of dumping them or even altering them. So instead of: Victim -> Router It is altered to: Victim -> Attacker -> Router How does the MITM work ? Without delving deeply to technicalities, the attacker will need three main tools: A. Spoofing tool - this one will make the attacker spoof the network to make the victim believe the attacker is the router thus sending all of its packets to the attacker instead of to the router, then the attacker will forward those packets to the router. B. Dumping tool - A tool to capture all of those packets going...