Title: Introduction to Intercepting Mobile Device Application Traffic
Author: Jeremy Druin
Description: From the KY ISSA May meeting, this video reviews intercepting mobile device traffic using two methods. The first uses the proxy settings in Android to direct proxy aware applications to use Burp Suite running on Kali as the application proxy. In part two, ettercap is used to ARP poison the Nexus 7 demo device and the web server. In this case all of the mobile device traffic is run through the Kali host (MITM). An unplanned demo of SSLstrip is included at the end.