![Hands-On Penetration Testing with Kali NetHunter](https://wfqqreader-1252317822.image.myqcloud.com/cover/840/36698840/b_36698840.jpg)
上QQ阅读APP看书,第一时间看更新
BadUSB MITM attacks
By now, you've probably noticed that there are some amazing HID- and USB-based attacks on the Kali NetHunter platform. The BadUSB MITM Attack allows a penetration tester to simply use an OTG cable to create a physical connection between a victim's computer and the NetHunter device. Once a connection has been established, all network traffic leaving the victim computer will be sent to the NetHunter device:
![](https://epubservercos.yuewen.com/60E4A5/19470381301503306/epubprivate/OEBPS/Images/f9239788-9583-4cfd-9c54-c306b8df8ab4.jpg?sign=1738973177-dxoZ0RvXTQdOKO9erT9kb3CJnV26v90Y-0-b487a1c9e7ca05b459b06f616636248c)
This type of attack is called a man-in-the-middle (MITM) attack as the NetHunter device implants itself between the victim's computer and the internet or any other network it is transmitting data on.