MITM II: Exploitation
This video requires PentesterLab PRO
GO PRO
MITM II: Exploitation
In this video, we cover MITM II, the second exercise from the intercept badge. The tutorial demonstrates how to manipulate DNS to redirect traffic to a local server, capture the traffic, and analyze the implications of TLS connections and self-signed certificates.