Man, I wish to hug you from here in London. I spent the entire week reading about ARP and DNS poisoning to understand the attack and use it to complete my attacks in the Ethical hacking course. In less than 30 minutes you did that. You are a great teacher, subscribed. Pls don't stop.
at the point that you have spoofed ARP, is it not possible to become the real end point of the https comms? ie the user thinking he is sending and recieving https but he is on http with you, and you are with https with linkdin?
Hi thanks for this very educative video Much appreciated But the attack does not work I have two systems which i attempted to use to run this attack one runs kali linux as the main Operating system (Attacking device) And the other one runs Windows 10 as the main OS (Victim device) i followed all the steps but the arp poisoning did not work Please how to i resolve this??
Please I have a question.. everything works fine but immediately I run the last command net.sniff on … the windows machine seems to disconnect from the internet and no packet was gotten on the Kali machine
@@-abstrvct-4438 after running net.niff on, I encountered the problem: "[00:08:34] [net.sniff.dns] dns gateway > local : 1.0.168.192.in-addr.arpa is Non-Existent Domain". I don't know how to fix it
Sorry for this but who the hell use the HTTP Here I'm using hstshijack caplet also But it working on android 6 version and below only Soo can you tell the other way to capture the HTTP request of latest version mobile