wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Man In The Middle Attack

profile
Ronak Gala
Feb 27, 2022
0 Likes
0 Discussions
84 Reads

A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required.

Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfers or an illicit password change.

Additionally, it can be used to gain a foothold inside a secured perimeter during the infiltration stage of an advanced persistent threat (APT) assault.

Broadly speaking, a MITM attack is the equivalent of a mailman opening your bank statement, writing down your account details and then resealing the envelope and delivering it to your door.

man in the middle mitm attack

Man in the middle attack example


Comments ()


Sign in

Read Next

Memory Management

Blog banner

HR Automation : Need of the hour

Blog banner

Data Warehousing

Blog banner

The Evolution of Operating Systems

Blog banner

WORKFRONT SOFTWARE

Blog banner

IoT Evolution

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Service Operations in ITSM

Blog banner

Policies for Service Transition

Blog banner

Disk scheduling

Blog banner

An Approach To Spyware Detection And Removal

Blog banner

MPL and how its effects?

Blog banner

HUBSPOT

Blog banner

Python as a tool for Data science task & project

Blog banner

Earth with no trees

Blog banner

RAID

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Developments in Modern Operating Systems

Blog banner

Interrupts - Types, Working & Importance

Blog banner

Culture Of Ladakh

Blog banner

Intrusion Detection System

Blog banner

Principles of Concurrency

Blog banner

Cycling

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Top 5 Benefits of Artificial Intelligence

Blog banner

VIRUS

Blog banner

Distributed Denial of Service (DDoS) attack

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

Chicken Dum Biryani

Blog banner

Zero-Day Attack

Blog banner

Deadlock in operating system

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Visualization in Data Science

Blog banner

To-Do List In LISP

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

"Life as a Part-time Student"

Blog banner

IoT Architecture Based Security

Blog banner

TRAIN TRAVELING

Blog banner

Theads

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

DATA BREACH CAUSES CHALLENGES PREVENTION AND FUTURE DIRECTIONS

Blog banner

ZOHO

Blog banner