Best Cyber Security

What is a Man in the Middle Attack?

A man in the middle attack is just one of several methods employed by hackers to breach and steal private, commercial, or sensitive information such as credit card numbers, login credentials, and passwords.

The procedure typically involves launching viruses or other malware types that serve as an avenue of infiltration between two parties (e.g., a client and a server) who are exchanging confidential data.

Neither party in the communication exchange is conscious that the data traveling through the channel is being seized by this intricately devious hacker application.

Surprisingly enough, the whole idea behind a man in the middle

Attack predates the widespread use of the Internet or even the invention of the personal computer.

Back in the day, the concept was employed in certain intelligence operations such that a third party would covertly start a dual channel interface between two other parties.

The unsuspecting pair would simply presume that they were in a direct conversation or contact with each other, so they're completely oblivious of the fact that the third party who manipulated the whole situation in the first place was seizing, translating, and sending their communication to his higher-ups.

Simply put, an online-based man in the middle attack is a concept born out of the age-old occupation of espionage, even though there's hardly anything "James Bond"-like about it.

With the advent of personal computers, home computers, desktop computers, laptops, notebooks, the Internet, and so on, the man in the middle paradigm was quickly adapted to this new era and medium.

By intercepting the Public Key for one of the parties of a particular online SSL correspondence, a hacker is able to impersonate one of the two users, send his Public Key to the second party while pretending to be the originating party, and steal the information he'll get from that point on from the second party.

The cyber attacker will be free to manipulate, copy, or sell the data he'd stolen from a naive mark and use it for a variety of cyber crimes.

Also, the mark of a successful man in the middle operation is to ensure that neither of the two swindled parties is aware of the situation or the hacker's existence.

➤ Related Pages

Anti Spam Firewall VPN
Appliance VS Software
Cloud Security
What is CISSP?
What is Data Leak Prevention?
What is Dumpster Diving?
What is GSM Encryption?
What is Grey Listing?
What is Port Knocking?
What is UDP?
What is Virus?
What is Whitelisting?
What is a Man in the Middle Attack?
What is a Routing Table?
What is search engine hacking?