Global Feed Post Login
Replying to Avatar Luxas

No worries, happy to explain. This one is more for the opposite of privacy haha and used to monitor traffic on a network and/or hack it. For example, if it were a public wifi, this alongside an application like Wireshark or other scripts could be used to capture or inject packets from/to any device connected. Anything captured and not sent over HTTPS would be seen as plain text. It could also be used to clone a wifi access point and steer traffic from the true wifi network to instead use mine. From there, various attacks could occur and potentially even decrypting HTTPS traffic.

5f
SO 1y ago

Wow...thank you for the info...will have to think about this.

Reply to this note

Please Login to reply.

Discussion

No replies yet.