Man in the Middle Attack - with bettercap and kali linux
*DISCLAIMER*
This video is for educational purposes only.
Don’t perform a man in the middle attack on the local public attack, if caught you will be in trouble.
Link on Bettercap -
This video uses the virtualization technique, I have used two virtual machines. One as Attacker(Kali Linux) and one as target machine(Windows os).
To Learn More about virtualization - #:~:text=Virtualization is the process of,on a computer system simultaneously.
To Download Virtual Box -
The Installation Process is very simple, just download your and install like every other program.
To Download Kali Linux -
Download the Installer, and double click on the downloaded file, rest of everything will be taken care of by virtual box.
To Download Web server(Metasploitable 2) -
Refer t