One of the most important tasks to keep in mind for a lot of the tools we are discussing here is making sure data flows through or to our Raspberry Pi. In order to be the man-in-the-middle (MITM), we need to make sure traffic flows from the source target, through our Pi, to the destination target. This way, we can eavesdrop on the conversation and do what we need to do.
With the Raspberry Pi, there are a couple ways to accomplish this. One involves physically putting our Raspberry Pi on the network, inline between the two targets. For the other two options, we will redirect traffic to the Raspberry Pi.
Having our Pi physically inline between the source and destination target makes sniffing the traffic very easy, but accomplishing this can be very hard. First, we will need physical access to the data center/network closet to achieve this. That can be very hard to achieve, and may involve social engineering to gain that type of access. Secondly...