This kind of attack only works if the victim/target is using http to connect to their mail server and not https. In this case, the connection is unsecured!
This means we can do packet sniffing without having to do much donkey work. For that, we use Wireshark (which has a great deal of capabilities beyond this alone).
It may seem strange that we’re attacking our own machine in this scenario, but a little more reading on Wireshark will let you know how this will work.
To add to that, for this attack you will also need to have a table of magic numbers at hand because they will be very useful to you.
This means we can do packet sniffing without having to do much donkey work. For that, we use Wireshark (which has a great deal of capabilities beyond this alone).
It may seem strange that we’re attacking our own machine in this scenario, but a little more reading on Wireshark will let you know how this will work.
To add to that, for this attack you will also need to have a table of magic numbers at hand because they will be very useful to you.
Comments
Post a Comment