- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 103字
- 2021-07-02 12:38:27
BadUSB MITM attacks
By now, you've probably noticed that there are some amazing HID- and USB-based attacks on the Kali NetHunter platform. The BadUSB MITM Attack allows a penetration tester to simply use an OTG cable to create a physical connection between a victim's computer and the NetHunter device. Once a connection has been established, all network traffic leaving the victim computer will be sent to the NetHunter device:

This type of attack is called a man-in-the-middle (MITM) attack as the NetHunter device implants itself between the victim's computer and the internet or any other network it is transmitting data on.
推薦閱讀
- Kali Linux Social Engineering
- Kali Linux CTF Blueprints
- Metasploit Penetration Testing Cookbook(Second Edition)
- Metasploit Penetration Testing Cookbook(Third Edition)
- 工業互聯網安全防護與展望
- 可信計算3.0工程初步
- .NET安全攻防指南(上冊)
- Learning Veeam? Backup & Replication for VMware vSphere
- 黑客攻防與無線安全從新手到高手(超值版)
- 云原生安全與DevOps保障
- Falco云原生安全:Falco原理、實踐與擴展
- Mastering Reverse Engineering
- 網絡安全態勢感知
- 網絡安全實戰詳解(企業專供版)
- 捍衛隱私