Data in motion exploit using kali
- or -
Post a project like this$$
- Posted:
- Proposals: 4
- Remote
- #2151433
- Expired
Description
Experience Level: Intermediate
i am working on a project to identify vulnerabilities in data in motion using practical examples.
this will be a man-in-the-middle attack where the attacker will capture all data whilst being the man-in-the-middle and also inject the data with malicious payload.
an example: a user is uploading a VM to the cloud, an attacker uses man-in-the-middle attack on the user, the attacker captures all traffic and also inject the VM with malicious payload.
is this something you can assist with?
preferable, we work together
Many thanks
A
this will be a man-in-the-middle attack where the attacker will capture all data whilst being the man-in-the-middle and also inject the data with malicious payload.
an example: a user is uploading a VM to the cloud, an attacker uses man-in-the-middle attack on the user, the attacker captures all traffic and also inject the VM with malicious payload.
is this something you can assist with?
preferable, we work together
Many thanks
A
Bade F.
100% (2)Projects Completed
3
Freelancers worked with
3
Projects awarded
0%
Last project
26 Aug 2020
Ireland
New Proposal
Login to your account and send a proposal now to get this project.
Log inClarification Board Ask a Question
-
There are no clarification messages.
We collect cookies to enable the proper functioning and security of our website, and to enhance your experience. By clicking on 'Accept All Cookies', you consent to the use of these cookies. You can change your 'Cookies Settings' at any time. For more information, please read ourCookie Policy
Cookie Settings
Accept All Cookies