Advertisement

What is MITM Attack ?

 

MAN IN THE MIDDLE ATTACK:

A man in the middle attack (MITM) is a type of cyber attack where an attacker intercepts and alters communication between two users, often to steal sensitive information or eavesdrop on conversation. In computer security, a man in the middle attack is also known as “Hijacking” .

MITM Attack example:

mitm works

Types of MITM Attack

1.ARP Spoofing

2.DNS Poisoning

3.DHCP Spoofing

4.SSL Stripping

5.Rogue Access Point

6.IP Spoofing

7.Email Hijacking

8.HTTPS Spoofing

  1. ARP Spoofing:  Where an attacker sends fake Address Resolution Protocol (ARP) messages onto a network, associating there own MAC(Media Access Control) Address with the IP Address of a legitimate device, such as router or server in order to intercept, modify or disrupt network traffic. 

      Example: Suppose we have a network with three devices:

  • Victim(192.168.1.100): A laptop connected to the network.
  • Gateway(192.168.1.1): The Network router.
  • Attacker(193.1681.200): A Malicious device connected to the network.

The attacker want to intercept traffic  between the victim and gateway.

arp spoofing works


2. DNS Poisoning: When an attacker corrupts the cache of a DNS (Domain  Name System) server by replacing the IP Address of a legitimate website or domain with the fake one, and redirecting users to a malicious website.

Example:

dns poisoning works

3. DHCP Spoofing: A type of cyber attack where an attacker sends fake DHCP (Dynamic Host Configuration Protocol) messages to a network, pretending to be a legitimate DHCP server, and device accepts the fake DHCP response and configures its IP Addresses and network settings.

dhcp spoofing works

4. SSL Stripping:

SSL stripping is an attack where a malicious actor intercepts an encrypted HTTPS session and downgrades it to an unencrypted HTTP session, allowing the attacker to steal sensitive data. This is done because most websites now use SSL/TLS certificates to encrypt traffic. Without SSL stripping, HTTPS is secure. With SSL stripping, the connection is no longer secure.

ssl stripping works

5. Rogue Access Point: Rogue access points are a type of malicious wireless device that can be used to intercept and steal sensitive information from devices connected to a wireless network. They can be set up to mimic legitimate access points, allowing attackers to capture and eavesdrop on network traffic.


rogue access point works

6.IP Spoofing: IP spoofing is a technique used by attackers to manipulate the source IP address of network packets. It can be used to launch various types of attacks, such as denial-of-service (DoS) attacks, session hijacking, and identity theft.

How IP Spoofing work:

ip spoofing works

To learn more about Session Hijacking.Click on Read more

7.Email Hijacking: Email hijacking via man-in-the-middle (MITM) attacks is a type of phishing attack where an attacker intercepts the communication between an email client and the email server, tricking the client into sending or receiving malicious emails.

How Email Hijacking work:

how email hijacking works


8. HTTPS Spoofing:HTTPS spoofing is a type of attack where an attacker intercepts and modifies encrypted HTTPS traffic, such as web requests and responses, to trick the user into revealing sensitive information or performing actions on their behalf.

How HTTPS Spoofing works:

 how http spoofing  work

How to Prevent MITM Attacks

While MITM attacks are stealthy, there are ways to defend against them:

  • Use HTTPS websites – Always check for the padlock icon before entering sensitive data.
  • Avoid public Wi-Fi – Or use a trusted VPN when using it.
  • Enable two-factor authentication (2FA) – Even if credentials are stolen, 2FA adds an extra layer of security.
  • Keep software updated – Patch known vulnerabilities that could be exploited.
  • Educate users – Many attacks succeed due to lack of awareness.

🔐 Learn more prevention tips from Kaspersky

Post a Comment

0 Comments