i see everywhere posts of people saying mixed content like images could lead to an attacker replacing the images beeing loaded from http to https, however i couldn't exploit this after hours testing different mitm tools. Does anyone know how to actually exploit this kind of "vulnerability".
That's all, thanks in advance.
The codes and tools i tried to exploit this:
./bettercap -T [ip] -X -httpd --> sniff and make a http server
./bettercap -T [IP] --proxy -P POST --> Proxy everything, see traffic going throw post
xerosploit with replace images module.