Man-In-The-Middle Attack (MITM)


Man-In-The-Middle Attack (MITM)

Man in the middle attacks are cyber security attacks that allow the attacker to eavesdrop on communication between two targets(such as between a user and a website, or between two systems). It can listen to a communication which should in normal settings must be private.

There are a several types of MITM attacks in general ,including:
1-DNS spoofing
Domain Name Server (DNS) spoofing (a.k.a. DNS cache poisoning) is an attack in which altered DNS records
are used to redirect online traffic to a fraudulent website that resembles its intended destination.

2-HTTPS spoofing
HTTPS websites can’t be spoofed. But that doesn’t mean hackers can’t create websites whose domains look very
similar to that of the targeted website. HTTPS spoofing, also known as homograph attacks, replace characters in
the targeted site’s domain with other non-ASCII characters that are very similar in appearance. The attack
exploits a feature called Punycode (Unicode), a standard that enables the registration of hostnames that contain
non-ASCII characters.

3-IP spoofing
In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with
a false source IP address, for the purpose of impersonating another computing system.

4-ARP spoofing
In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an
attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network.
The attack can only be used on networks that use ARP, and requires attacker have direct access to the local
network segment to be attacked

5-SSL hijacking
A superfish uses a process called SSL hijacking to get at users’ encrypted data. The process is
actually quite simple. When you connect to a secure site, your computer and the server go
through a number of steps:
-Your computer connects to the HTTP (insecure) site.
-The HTTP server redirects you to the HTTPS (secure) version of the same site.
-Your computer connects to the HTTPS site.
-The HTTPS server provides a certificate, providing positive identification of the site.
-The connection is completed.
• SSL (Secure Sockets Layer) and its successor, TLS (Transport Layer Security), are
protocols for establishing authenticated and encrypted links between networked
computers. Although the SSL protocol was deprecated with the release of TLS 1.0 in
1999, it is still common to refer to these related technologies as “SSL” or “SSL/TLS".

• Many sites lead you to believe that just because there is a padlock icon in the corner of
your screen, or https:// at the beginning of the address, that data being exchanged on
these pages is secure. This isn't always the case

6-Wi-Fi hacking
Wireless networks are accessible to anyone within the router’s transmission
radius. This makes them vulnerable to attacks. Hotspots are available in public
places such as airports, restaurants, parks, etc


As an example, a man in the middle attack happens when the attacker wants to intercept a communication between person A and person B.
person A sends their public key to person B, but attacker intercepts it and sends a forged message to person B, representing themselves as A, but instead it has the attackers
public key. B believes that the message comes from person A and encrypts the message with the attackers
public key, sends it back to A, but attacker again intercepts this message, opens the message with private
key, possibly alters it, and re-encrypts it using the public key that was firstly provided by person A. Again,
when the message is transferred back to person A, they believe it comes from person B, and this way, we
have an attacker in the middle that eavesdrops the communication between two targets.

MITM attacks are inherently dangerous due to the significant risks they pose to individuals and organizations. First and foremost, they compromise the confidentiality of sensitive information by allowing unauthorized access to data that should remain private. This can lead to identity theft, financial fraud, or unauthorized access to secure systems. Moreover, MITM attacks undermine the integrity of communication by enabling attackers to manipulate or falsify information exchanged between parties. This manipulation can have far-reaching consequences, such as altering financial transactions or misleading users into unknowingly divulging additional sensitive information.

Copyright © 2024 Cybernero | Powered by Alienus.tech