Men In The Middle Attack Basics
A man-in-the-middle (MITM) attack intercepts and manipulates communication between two parties. The attacker acts as a “middleman” and can alter or view the communication as it passes through, without the parties being aware of the interception. MITM attacks can be carried out using a variety of protocols, including: HTTP: MITM attacks can be carried out ..
Read moreCl13nt SId3 H4cKing Introduction
In this article we will introduce some basic concepts to understand the hacking techniques used against browsers focused on their “Client-Side”. JavaScript is a programming language that is commonly used in web development. It is a client-side scripting language, which means that it is executed by the user’s web browser rather than on a server. JavaScript..
Read moreTshark uses for pentest
TSHARK CHEET SHEEP USES FOR PENTESTERSThis post shows a series of examples of the “tshark” command using it for different purposes, the examples shown below are specific to see interesting information regarding a particular protocol. Intrusion detection Capture of credentials/hashes Capture of suspicious traffic etc… Before we start we need to know ..
Read more