Perform an Attacker-in-the-Middle Exploitation
In this Lab, you will gain hands-on experience performing an Attacker in the Middle (AitM) exploitation. First, you will configure Burp Suite for AitM and compromise a target client. Next, you will intercept and manipulate client plaintext requests. Last, you will perform an AitM interception and modification of TLS encrypted HTTPS sessions.
Time
30 minutes
Difficulty
Beginner
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Overview
In this Lab, you will gain hands-on experience performing an Attacker in the Middle (AitM) exploitation. First, you will configure Burp Suite for AitM and compromise a target client. Next, you will intercept and manipulate client plaintext requests. Last, you will perform an AitM interception and modification of TLS encrypted HTTPS sessions.
Learning Partner