Upload
-
View
101
Download
3
Embed Size (px)
Citation preview
#what
Traffic Normal Flow
hacker
access pointvictim
(1) who’s 10.0.0.2
10.0.0.210.0.0.100
10.0.0.137
#what
Traffic Normal Flow
hacker
access pointvictim10.0.0.210.0.0.100
(3) hey! 10.0.0.2 request content from
stephack.com plz
10.0.0.137
#what
Traffic Normal Flow
hacker
access pointvictim10.0.0.210.0.0.100
(4) request content stephack.com
10.0.0.137
#what
Traffic Normal Flow
hacker
access pointvictim10.0.0.210.0.0.100
(5) stephack.com response content
10.0.0.137
#what
Traffic Normal Flow
hacker
access pointvictim10.0.0.210.0.0.100
(6) hey, 10.0.0.100 this is content of stephack.com sir.
10.0.0.137
#what
hacker
MITM attack Traffic Flowaccess pointvictim
10.0.0.210.0.0.100
10.0.0.137
(1) i’m 10.0.0.2 i’m 10.0.0.2 i’m 10.0.0.2
.
.
.
(2) i’m 10.0.0.100 i’m 10.0.0.100 i’m 10.0.0.100
.
.
.
#what
hacker
MITM attack Traffic Flowaccess pointvictim
10.0.0.210.0.0.100
10.0.0.137
(3) hey! 10.0.0.2 request content from
stephack.com plz
#what
hacker
MITM attack Traffic Flowaccess pointvictim
10.0.0.210.0.0.100
10.0.0.137
(4) hey! 10.0.0.2 request content from
stephack.com plz
#what
hacker
MITM attack Traffic Flowaccess pointvictim
10.0.0.210.0.0.100
10.0.0.137
(5) request content stephack.com
#what
hacker
MITM attack Traffic Flowaccess pointvictim
10.0.0.210.0.0.100
10.0.0.137
(6) stephack.com response content
#what
hacker
MITM attack Traffic Flowaccess pointvictim
10.0.0.210.0.0.100
10.0.0.137
(7) hey, 10.0.0.100this is content of stephack.com sir.
#what
hacker
MITM attack Traffic Flowaccess pointvictim
10.0.0.210.0.0.100
10.0.0.137
(8) hey, 10.0.0.100 this is content of stephack.com sir.