May 21, 2021

Is it possible to replace the packets in a MITM attack?

I recently started learning about wireless hacking, and I came up with an idea to prank my friends by doing a MITM attack and redirecting every request they make to a rickroll. My idea for the attack is to intercept all the HTTP requests and replace them with a request to the rickroll video. Since I am not actually trying to read the requests being sent, I think that this should also work with HTTPS. However, I couldn’t find any attacks similar to this other than maybe a DNS spoofing attack, but I ruled it out because most of the visited domains are stored in the local dns cache anyway. One way I attempted to get this to work is by arp spoofing my own network and using IP tables to redirect all traffic coming to port 80 to a local webserver I set up that will redirect them to the youtube video, however, for some reason, this didn’t work and the victim machine could no longer access the internet. It’s possible that I just didn’t use IP tables correctly. Anyway, does anyone have any idea of ways I could achieve this?

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.