SecPoint - Best IT Security
The best Innovative and powerful IT Security products

Encyclopedia / Encyclopedia Part 3 /

What is a Man in the Middle Attack?

 
A man in the middle attack is just one of several methods employed by hackers to breach and steal private, commercial, or sensitive information such as credit card numbers, login credentials, and passwords.The procedure typically involves launching viruses or other malware types that serve as an avenue of infiltration between two parties (e.g., a client and a server) who are exchanging confidential data. Neither party in the communication exchange is conscious that the data traveling through the channel is being seized by this intricately devious hacker application.

Surprisingly enough, the whole idea behind a man in the middle

Attack predates the widespread use of the Internet or even the invention of the personal computer. Back in the day, the concept was employed in certain intelligence operations such that a third party would covertly start a dual channel interface between two other parties.The unsuspecting pair would simply presume that they were in a direct conversation or contact with each other, so they're completely oblivious of the fact that the third party who manipulated the whole situation in the first place was seizing, translating, and sending their communication to his higher-ups.
 
Simply put, an online-based man in the middle attack is a concept born out of the age-old occupation of espionage, even though there's hardly anything "James Bond"-like about it. With the advent of personal computers, home computers, desktop computers, laptops, notebooks, the Internet, and so on, the man in the middle paradigm was quickly adapted to this new era and medium.
 
By intercepting the Public Key for one of the parties of a particular online SSL correspondence, a hacker is able to impersonate one of the two users, send his Public Key to the second party while pretending to be the originating party, and steal the information he'll get from that point on from the second party.The cyber attacker will be free to manipulate, copy, or sell the data he'd stolen from a naive mark and use it for a variety of cyber crimes. Also, the mark of a successful man in the middle operation is to ensure that neither of the two swindled parties is aware of the situation or the hacker's existence.

 

➤ Related pages
Anti-Spam Firewall
Appliance VS Software
Cloud Security
WEP Key
What is a Man in the Middle Attack?
What is a Routing Table?
What is CISSP?
What is Data Leak Prevention?
What is Dumpster Diving?
What is Grey Listing?
What is GSM Encryption?
What is Instant Messaging?
What is Port Knocking?
What is search engine hacking?
What is Spyware?
What is TCP?
What is UDP?
What is UTM?
What is Virus?
What is VoIP?
What is Whitelisting?
WiFi Pen Test
WPA Key

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef