This document discusses techniques for man-in-the-middle attacks using Backtrack 5 R3. It begins with a caution that the information is for educational purposes only. It then outlines different attack scenarios like ARP poisoning and DNS spoofing that can be used locally or through a gateway. The bulk of the document provides step-by-step instructions for setting up an ARP poisoning man-in-the-middle attack on a local area network using tools like Ettercap on Backtrack 5 R3. It concludes with reminders not to use the techniques for illegal purposes and to learn more about how ports and IP addressing work.
Related topics: