Hacking

Video: Man-in-the-Middle – how it works

August 17, 2010 by Keatron Evans

This is a step-by-step video of the man-in-the-middle attack. We teach this and much more in our ethical hacking course. We’ll also teach you how to defend against such attacks. For a powerpoint diagram version of the man-in-the-middle attack you can go here.

Posted: August 17, 2010
Articles Author
Keatron Evans
View Profile

Keatron, one of the two lead authors of “Chained Exploits: Advanced Hacking Attacks From Start to Finish”, is a Senior Instructor and Training Services Director at InfoSec Institute.
Keatron is regularly engaged in training and consulting for members of the United States intelligence community, military, and federal law enforcement agencies. Keatron specializes in penetration testing and digital forensics. In addition to training, Keatron serves as Senior Security Researcher and Principle of Blink Digital Security which performs penetration tests and forensics for government and corporations.