How man in the middle attacks work?


In the image above, you'll notice that the attacker inserted him/herself in-between the flow of traffic between client and server. Now that the attacker has intruded into the communication between the 2 endpoints, he/she can inject false information and intercept the info transferred between them.
The hacker is impersonating each side of the conversation to realize access to funds. This example holds true for a conversation with a client and server also as person-to-person conversations. In the example above, the attacker intercepts a public key and thereupon can transpose his own credentials to trick the people on either end into believing they're talking to one another securely.

Interactions Susceptible to MITM Attacks

  • Financial sites – between login and authentication
  • Connections meant to be secured by public or private keys
  • Other sites that need logins – where there's something to be gained by having access
If you want to safe your self from Man in the Middle Attacks or want to be a Certified Ethical Hacker (White Hat Hacker) then visit ISOEH (Indian School Of Hacker) one of the oldest & top institutions in India, involved in high end skill development in the field of cyber security.

Comments

Popular posts from this blog

What is ethical hacking?

What is a Registered Retirement Savings Plan (RRSP)?

What is contemporary art?