Written by Jay
During most mobile application or IoT pen test, it’s often a requirement to perform a man in the middle attack to view network traffic. Below are some approaches which work when the it’s not possible to set a system proxy (or when a mobile application does not honour it).
ARP Poisioning Pros/Cons Pro cons Easy |Active attack; can be detected Redirects all traffic |Can be risky |Device and laptop need to be on the same network.
Presented by: Tim
An introductory look at the the various tools and techniques for performing man in the middle attacks, as well as the techniques and tips to defend against them.
The presentation will include a few demos of the tools and a show and tell of devices which can be used to make the attacks easier.
For those new to MitM attacks, this is a very powerful technique used to intercept and modify network traffic (which is why encryption is so important!