Perform an Attacker-in-the-Middle Exploitation

In this Lab, you will gain hands-on experience performing an Attacker in the Middle (AitM) exploitation. First, you will configure Burp Suite for AitM and compromise a target client. Next, you will intercept and manipulate client plaintext requests. Last, you will perform an AitM interception and modification of TLS encrypted HTTPS sessions.

Overview

In this Lab, you will gain hands-on experience performing an Attacker in the Middle (AitM) exploitation. First, you will configure Burp Suite for AitM and compromise a target client. Next, you will intercept and manipulate client plaintext requests. Last, you will perform an AitM interception and modification of TLS encrypted HTTPS sessions.

Learning Partner
Skillable
Skillable
Ready-built content across a variety of topics and technologies