Description: Continuing the serie in this video we go to see how use the Man Left in the Middle Attack.. Plase leave your comments
Tags: SET ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Hi Zerocool394 Your Teaching Style is Awesome :)
I have Learned Lots of things from you. keep up the good work
Thank You.
hi Zerocool394 , its very nice to see you again in this series after a long time . i hope this will be another great megaprimer.
thanks
There was a lot of new material for me in there. I have heard of DVWA but have no experience of using it and little experience of HTML. It looks like I have a lot of homework to do!
I suspect it would be possible to use a real website (maybe cloned?) to which the victim would be lured? I realise that SET allows websites to be cloned.
Finally, I am pleased to see you back and creating educational material. I thought that you were busy with other things such as work or studying! As always, I am looking forward to seeing more videos from you.