1. 2
    Simulate Man in the Middle Attacks and Inspect Network Traffic with Charles Proxy
    3m 1s

Simulate Man in the Middle Attacks and Inspect Network Traffic with Charles Proxy

InstructorMike Sherov

Share this video with your friends

Send Tweet

In this lesson, we'll learn how to use Charles Proxy to “sniff” the web traffic flowing an example website using an attack known as a Man in the Middle attack, or MITM. Because our example website is using http and not https, you'll “discover” a vulnerable piece of user data called a session id being transmitted in cleartext across every request. This info will become the central piece of data that we'll learn how to protect throughout this course.

Jacob Evans
~ 4 years ago

I love InfoSec/CyberSecurity and this is a super cool thing to see on this platform!!