Wykorzystanie mitm i dnsspoof do przechwycenia sesji komunikacyjnej
Monitoring system logs using the Logcheck
Author(s): Jacek WołoszynSubject(s): Education
Published by: Wydawnictwo Oświatowe FOSZE
Keywords: man-in-the-middle, dnsspoof, 802.11, wireless network
Summary/Abstract: The article describes an attack mitm /man-in-the-middle/ along with redirecting DNS traffic on the selected machine. Discuss the process allows you to trace the path of the attacker. Network administrators will be able to carefully look at the problem in relation to their own network resources.
Journal: Edukacja - Technika - Informatyka
- Issue Year: V/2014
- Issue No: 2
- Page Range: 419-424
- Page Count: 6
- Language: Polish