logo

Man-In-The-Middle Attack

   

Added on  2022-10-09

18 Pages3456 Words309 Views
Running head: MAN-IN-THE-MIDDLE ATTACK
Man-In-The-Middle Attack
Name of the Student
Name of the University
Author Note
Man-In-The-Middle Attack_1
MAN-IN-THE-MIDDLE ATTACK1
Table of Contents
Introduction 2
Discussion 2
The Man-in-the-Middle (MitM) attack 2
ARP spoofing 3
Session Hijacking3
IP Spoofing 4
Replay 5
Man-in-the-Middle Attacks and their Types 7
Rogue Access Point 7
ARP Spoofing 8
MDNS Spoofing 8
DNS Spoofing 9
Man-in-the-Middle Attack Techniques9
Sniffing 9
Packet Injection 10
Session Hijacking 11
SSL Stripping 11
Preventing Man-in-the-Middle Attacks 11
Strong WEP/WAP Encryption on Access Points 11
Virtual Private Network 12
Force HTTPS 12
Public Key Pair Based Authentication 12
Recent example of the attack 12
Conclusion 14
References 15
Man-In-The-Middle Attack_2
MAN-IN-THE-MIDDLE ATTACK2
Man-In-The-Middle Attack_3
MAN-IN-THE-MIDDLE ATTACK3
Introduction
The rate of cyber-attacks has gradually increased over years. The Small sized and
large sized enterprises are often targeted by the group of attackers. The governmental and
corporate offices have also been attacked several times in the last decade. The cyber-attacks
are mostly intentional and motivated criminally or either politically who breaks down the
system of the organization and creates delay in the operation of any organization (Uma and
Padmavathi 2013).
The cyber-attacks are any kind of offensive attacks or the actions that generally
attacks on the computer information systems or the organizational infrastructures that deals
with or runs on computer networks and devices and involves various methodologies that
helps them to steal the data from the organization’s system network (Kotenko and Chechulin
2013). The Cyber-attacks are of various kinds. Some of them are Man in the middle attacks,
denial of service DOS attacks, phishing as well as spear phishing attacks, password attacks,
drive by attacks, SQL injection attacks, XSS cross site scripting attacks.
The aim of the report is to evaluate one of the cyber-attacks which are known as the
MitM attack. The MitM attack happens or is done when an attacker or group or the hacker
gets himself between the transaction or communication process that is continued between the
client and a server or the authorities and stakeholders related to the organization.
Discussion
The Man-in-the-Middle (MitM) attack
The MitM attack has some general and common kinds of attack, which are namely:
Man-In-The-Middle Attack_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mitigation Strategies for Distributed Denial of Service (DDoS) Attack
|7
|1857
|53

Introduction to Cyber Security
|14
|3209
|388

Network Security Executive Summary 2022
|10
|2381
|9

CSI2102 - Information Security: Assignment
|17
|1220
|277

Network Devices Security: Threats, Potential Damages, and Mitigation Strategies
|6
|1897
|178

Wireless Network Vulnerabilities and Security Measures - Desklib
|7
|1988
|258