wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Man In The Middle Attack

profile
Ronak Gala
Feb 27, 2022
0 Likes
0 Discussions
84 Reads

A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required.

Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfers or an illicit password change.

Additionally, it can be used to gain a foothold inside a secured perimeter during the infiltration stage of an advanced persistent threat (APT) assault.

Broadly speaking, a MITM attack is the equivalent of a mailman opening your bank statement, writing down your account details and then resealing the envelope and delivering it to your door.

man in the middle mitm attack

Man in the middle attack example


Comments ()


Sign in

Read Next

Metasploit

Blog banner

Vulnerability Assessment

Blog banner

Deadlock

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

LISP - Library Management System

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Importance of Network Security Risk

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

How To Invest In Indian Stock Market @ BSE & NSE ~ Tutorial 3

Blog banner

Synchronization

Blog banner

MEMORY FORENSIC ACQUISITION AND ANALYSISOF MEMORY AND ITS TOOLS COMPARISON

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

NETSUITE

Blog banner

Data Mining

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

File Management

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Im Photographer

Blog banner

PODIO

Blog banner

Cache Memory in Operating Systems

Blog banner

STARVATION

Blog banner

15 Interesting Facts about India

Blog banner

Python as a tool for data analysis

Blog banner

Cyber-crime Investigation and Future Directions

Blog banner

LiquidPlanner

Blog banner

Functions Of Operating Systems

Blog banner

Evolution of Operating System

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

Data Security must be your Priority!

Blog banner

To-Do List In LISP

Blog banner

Never give up

Blog banner

Data-Driven Prediction of Virtual Item Prices in Online Games

Blog banner

Memory Management

Blog banner

Footprinting

Blog banner

Zoho

Blog banner

memory managment

Blog banner

What is Amazon?

Blog banner

Health and fitness in technology

Blog banner