In: Computer Science
How would you use a man-in-the-middle attack to capture a password? Provide a detailed description.
man in the middle attack is done using arp-poisoning technique in which it only affect in the http protocol unless inject fake https secured certificate but now a days most of all antivirus detects fake certificate connection .
using arp-poisoning attacker just redirect packets from mac address in which all packet will be redirect from attacker's machine in which attack is running with kali linux along with wireshark which captures all the http traffic and found all transfers with http GET and POST method data.
if you have any doubt then please ask me without any hesitation in the comment section below , if you like my answer then please thumbs up for the answer , before giving thumbs down please discuss the question it may possible that we may understand the question different way and we can edit and change the answers if you argue, thanks :)