Overview
In this Lab, you will gain hands-on experience performing an Attacker in the Middle (AitM) exploitation. First, you will configure Burp Suite for AitM and compromise a target client. Next, you will intercept and manipulate client plaintext requests. Last, you will perform an AitM interception and modification of TLS encrypted HTTPS sessions.
Learning Partner
Skillable
Ready-built content across a variety of topics and technologies