![Hands-On Penetration Testing with Kali NetHunter](https://wfqqreader-1252317822.image.myqcloud.com/cover/840/36698840/b_36698840.jpg)
上QQ阅读APP看书,第一时间看更新
BadUSB MITM attacks
By now, you've probably noticed that there are some amazing HID- and USB-based attacks on the Kali NetHunter platform. The BadUSB MITM Attack allows a penetration tester to simply use an OTG cable to create a physical connection between a victim's computer and the NetHunter device. Once a connection has been established, all network traffic leaving the victim computer will be sent to the NetHunter device:
![](https://epubservercos.yuewen.com/60E4A5/19470381301503306/epubprivate/OEBPS/Images/f9239788-9583-4cfd-9c54-c306b8df8ab4.jpg?sign=1738823239-2ZXiobVpt37xq4qa1phx5BjMvuJqgh5X-0-8af24e5ff2f503d9690c07093b48f84b)
This type of attack is called a man-in-the-middle (MITM) attack as the NetHunter device implants itself between the victim's computer and the internet or any other network it is transmitting data on.