From charlesreid1

Layer 1 = Physical layer

Layer 2 = Data Link layer


Wired MITM attacks:


Evil Twin

The following wiki pages have notes on carrying out a wireless Evil Twin MITM attack:

  • Evil Twin - background info, overview of process
  • Evil Twin/Setup - how to set up the hardware to carry out the evil twin attack
  • Man in the Middle/Evil Twin - once the Evil Twin AP is created, you can use it to carry out the MITM attack by creating a bridge for traffic from one interface to another and sniffing all the traffic passing through the bridge
  • Man in the Middle/Evil Twin with Ettercap - to conduct a MITM attack with an Evil Twin AP, you can use ettercap to sniff the network interface bridge