How data can be modified in a man in the middle attack? is there any video demonstrating that,any how to guide,i need practical material ,i have used cain and abel,ettercap but now i am strucked i don't know how to move furthur. I am able to see the packets but, how do i modify them.please help me.
Note:-I am working on mini project where i have to simulate the Man-in-the-Middle attack.