MITM II: Exploitation

Return to Exercise
image of exercise MITM II: Exploitation

This video requires PentesterLab PRO

GO PRO
MITM II: Exploitation

In this video, we cover MITM II, the second exercise from the intercept badge. The tutorial demonstrates how to manipulate DNS to redirect traffic to a local server, capture the traffic, and analyze the implications of TLS connections and self-signed certificates.

video duration icon07:00 number of views icon2133