Perform an Attacker-in-the-Middle Exploitation

In this Lab, you will gain hands-on experience performing an Attacker in the Middle (AitM) exploitation. First, you will configure Burp Suite for AitM and compromise a target client. Next, you will intercept and manipulate client plaintext requests. Last, you will perform an AitM interception and modification of TLS encrypted HTTPS sessions.

Time
30 minutes
Difficulty
Beginner
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

In this Lab, you will gain hands-on experience performing an Attacker in the Middle (AitM) exploitation. First, you will configure Burp Suite for AitM and compromise a target client. Next, you will intercept and manipulate client plaintext requests. Last, you will perform an AitM interception and modification of TLS encrypted HTTPS sessions.