SecPoint - Best IT Security
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 2 /

Man-in-the-middle Attack

A popular attack to carry out without the user even knowing about it Man in the middle attack is most commonly heard in the field of cryptography and it may be abbreviated as MITM. Other names are also used to refer to this kind of assault and these are the Janus attack and the bucket-brigade attack.
Man in middle attack is one of the many popular types of eavesdropping that exists as of the present times. Vicious criminals perform this assault by generating a number of unconstrained connections with other individuals and groups of messages will be relayed between the attacker and his or her victims. This process will then deceive the individuals and they will end up trusting the idea that there is an actual ongoing direct communication via a private connection. But in reality, the exchange of words among the targets is actually under the control of the attacker himself or herself.

In addition, the attacker should interrupt

The conversation among the many individuals so as to have the chance to incorporate new messages. And, in most situations, this occurs without any intricacies in the process. In simpler terms, the attacker can include himself in the exchange of message as a man-in-the-middle and this may be done when he or she is already found inside the reception range of the Wi-Fi wireless access point, which is not encrypted.

The main target of a MITM is actually the mutual authentication

This form of eavesdropping assault will become successful only if the criminal manages to perfectly masquerade as the victims on each of the endpoints so as to convince them.
There are different ways as to how one party may be protected against the MITM assaults. People should be reminded of the fact that there is the great need to employ authentication procedures to ensure a more protected environment. The methods are based on the following: stronger mutual authentication like secret keys and passwords, public key infrastructures, and one-time pads. It is also best to have latency examination, second channel verification, and carry-forward verification.
 Vulnerability Scanner - Vulnerability Management 

➤ Related pages
Aircrack
Application Security
Black box
Blind SQL Injection
Blue box
Global System for Mobile GSM
Hacker
Internet Filter
Logic Attack
Logic Bomb
Malware
Man in the Middle Attack
PCI-DSS Compliance
Red box
Server Spam Filter
Shoulder Surfing
Wardriving
What is 2600?
What is a Botnet?
What is SANS Top 20?
What is vlan tagging?
What is Wimax?
What is Zero Day?

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef