man in the middle attack
DESCRIPTION
Man in the Middle AttackTRANSCRIPT
![Page 1: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/1.jpg)
Man In The Middle Attack
NIIT University, NeemranaSeptember 11, 2014Anshuman Mishra
Rahul JainAbhishek
Tibrewala
![Page 2: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/2.jpg)
2
Agenda
Introduction
Key Concept
Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:
Tools Used
Types of MITM Attack
![Page 3: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/3.jpg)
3
Agenda
Introduction
Key Concept
Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:
Tools Used
Types of MITM Attack
![Page 4: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/4.jpg)
IntroductionA Man-in-the-Middle attack is a type of cyber attack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A Man-in-the-Middle Attack allows a malicious actor to intercept, send, and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-Middle attacks can be abbreviated in many ways including, MITM, MitM, MiM, or MIM.
![Page 5: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/5.jpg)
5
Agenda
Introduction
Key Concept
Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:
Tools Used
Types of MITM Attack
![Page 6: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/6.jpg)
Key ConceptMan-in-the-Middle is a type of eavesdropping attack that occurs when a malicious actor inserts himself as a relay/proxy into a communication session between people or systems.
A MITM attack exploits the real time processing of transactions, conversations, or transfer of other data.
A Man-in-the-Middle attack allows an attacker to intercept, send, and receive data never meant to be for them without either outside party knowing until it is too late.
![Page 7: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/7.jpg)
Example:(1/2)
![Page 8: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/8.jpg)
Example: Continue…(2/2)
![Page 9: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/9.jpg)
9
Agenda
Introduction
Key Concept
Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:
Tools Used
Types of MITM Attack
![Page 10: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/10.jpg)
Interactions Susceptible to MITM AttackFinancial sites – between login and authenticationConnections meant to be secured by public or private keysOther sites that require logins – where there is something to be gained by having access
![Page 11: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/11.jpg)
11
Agenda
Introduction
Key Concept
Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:
Tools Used
Types of MITM Attack
![Page 12: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/12.jpg)
Different Attacks in Different Scenarios:
LAN LOCAL TO REMOTE
ARP Poisoning ARP Poisoning
DNS Spoofing DNS Spoofing
STP Mangling DHCP Spoofing
Port Stealing ICMP Redirection
IRDP Spoofing
Route Mangling
REMOTE
DNS Poisoning WIRELESS
Traffic Tunneling
Route Mangling Access Point Reassociation
![Page 13: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/13.jpg)
13
Agenda
Introduction
Key Concept
Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:
Tools Used
Types of MITM Attack
![Page 14: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/14.jpg)
Types of MITM AttackInjectionKey ManipulationDowngrade AttackFiltering
![Page 15: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/15.jpg)
Examples: Key Manipulation
![Page 16: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/16.jpg)
Examples: Filtering
![Page 17: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/17.jpg)
Examples: ARP Poisoning
![Page 18: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/18.jpg)
18
Agenda
Introduction
Key Concept
Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:
Tools Used
Types of MITM Attack
![Page 19: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/19.jpg)
Tools UsedCain and AbelWiresharkKali LinuxEttercap
SSL StripVM Ware
USB WI-FI Adapter
![Page 20: Man in the Middle Attack](https://reader035.vdocuments.us/reader035/viewer/2022062400/577cc4e91a28aba7119acd41/html5/thumbnails/20.jpg)
20
Thank you