Questions about this topic? Sign up to ask in the talk tab.

MITM attack

From NetSec
Jump to: navigation, search

Man In The Middle attack

A method to forcibly route the traffic between two hosts so that it can be sniffed between them. Normal traffic flows on a network as follows:

 Client Machine --> Router --> [Other Routing Hops] --> Destination

Man in the middle attacks allow an attacker to tell remote machines or routers on or for subnets or ethernet networks (switches or hubs) that the traffic routed to and from the victim IP address must pass through the attacker's system.

 [Victim] Poisoned Machine --> [Attacker] Fake Router --> [Internet] Upstream Router --> [Other Hops] --> Destination

This exploitation in the internet protocol can cause high packet loss when the amount of traffic hijacked by the attack exceeds the maximum throughput of networking hardware on the attacker's machine.


This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.