- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 103字
- 2021-07-02 12:38:27
BadUSB MITM attacks
By now, you've probably noticed that there are some amazing HID- and USB-based attacks on the Kali NetHunter platform. The BadUSB MITM Attack allows a penetration tester to simply use an OTG cable to create a physical connection between a victim's computer and the NetHunter device. Once a connection has been established, all network traffic leaving the victim computer will be sent to the NetHunter device:

This type of attack is called a man-in-the-middle (MITM) attack as the NetHunter device implants itself between the victim's computer and the internet or any other network it is transmitting data on.
推薦閱讀
- 計算機網絡安全技術(第6版·慕課版)
- Mobile Forensics Cookbook
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- Wireshark 2 Quick Start Guide
- INSTANT Metasploit Starter
- Enterprise Cloud Security and Governance
- INSTANT Windows PowerShell
- Kali Linux Network Scanning Cookbook(Second Edition)
- Spring Security(Third Edition)
- 從實踐中學習Kali Linux滲透測試
- 軟件安全保障體系架構
- 物聯網安全滲透測試技術
- API安全技術與實戰
- 信息安全導論(第2版)
- 互聯網企業安全高級指南