Originally posted by cybertraveler
View Post
I'll provide some examples of some reasonably easy ways to execute MITM.
You're in a dorm, there's people around you running apt-based distros, you know if you put up a hotspot for a while and the credentials become public knowledge that several of them may begin to 'borrow' your network. Those people need to recognise that they are in a high risk situation.
You run a Starbucks... well if your customers are running a laptop with automatic updates they could also fall prey to you.
You run a Blog. You can break into the router config of any of the hundreds of vulnerable wifi router models of your visitors (most of them can be broken merely by directing them to a web page which contains a hidden image with a link to http://192.168.1.1/some_vulnerable_config_path and after that you can take control of their router).
Yes these can all be done relatively easily. But these are low-value targets, not worth the effort and risk of conviction, so you're not going to do it.
Comment