Target linkedin.com
Verified on 2017-12-01
Verified by Ruben
Browsers Microsoft Windows 7, 10
OS This template redirects requests sent from the victim system to the Linkedin web server to a server that is controlled by the attacker. HTTPS/HSTS is circumvented by DNS CNAME redirection.
Description The attacker can read the unencrypted data flowing between the victim system and the Linkedin server. This way the attacker can for example read the login procedure.
Impact The attacker can read the unencrypted data flowing between the victim system and the Linkedin server. This way the attacker can for example read the login procedure.

Download