Skip main navigation

Getting Sneaky: Using DVWA to identify MiTM attacks

This video explains how to use DVWA to monitor network traffic to identify MiTM attacks.

This video explains how to use DVWA to monitor network traffic to identify MiTM attacks.

DVWA is a web application that is vulnerable to attacks and is therefore useful for demonstrating how MiTM attacks can successfully occur. This video explains how to use DVWA to monitor network traffic to identify MiTM attacks.

Reflect and share: Have you tried using traffic monitoring software before? What are the red flags you would look for when monitoring network traffic?

This article is from the free online

Advanced Cyber Security Training: Network Security

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now