HTTP MitM attack
This section combines the techniques from the ARP & DNS spoofing, and demonstrates how an attacker would be able to leverage the MitM position to intercept and modify HTTP data/traffic.
Overview of attack
Parameters
Attacking commands
msftconnecttest.com
Factors that trigger the browser to open the msfconnecttest.com/redirect address (theory)
Practical experimentation based on point 2 (force the NCSI probes to fail)
Assume the following:
Connect to VPN (expected to fail) for a few seconds, before disconnecting again
Experiment results
Further experimentation: authentication and automatic sign-in page
Last updated