Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "MITM attack"

From NetSec
Jump to: navigation, search
 
Line 1: Line 1:
 
<b>M</b>an <b>I</b>n <b>T</b>he <b>M</b>iddle attack
 
<b>M</b>an <b>I</b>n <b>T</b>he <b>M</b>iddle attack
  
A method to forcibly route the traffic between two hosts so that it can be [[sniffing|sniffed]] between them.
+
A method to forcibly route the traffic between two hosts so that it can be [[sniffing|sniffed]] between them.  Normal traffic flows on a network as follows:
 +
 
 +
  Client Machine --> Router --> [Other Routing Hops] --> Destination
 +
 
 +
Man in the middle attacks allow an attacker to tell remote machines or routers on or for subnets or ethernet networks (switches or hubs) that the traffic routed to and from the victim [[IP address]] must pass through the attacker's system.
 +
 
 +
  [Victim] Poisoned Machine --> [Attacker] Fake Router --> [Internet] Upstream Router --> [Other Hops] --> Destination
 +
 
 +
This exploitation in the internet protocol can cause high packet loss when the amount of traffic hijacked by the attack exceeds the maximum throughput of networking hardware on the attacker's machine.
  
 
==Examples==
 
==Examples==

Latest revision as of 11:12, 20 October 2012

Man In The Middle attack

A method to forcibly route the traffic between two hosts so that it can be sniffed between them. Normal traffic flows on a network as follows:

 Client Machine --> Router --> [Other Routing Hops] --> Destination

Man in the middle attacks allow an attacker to tell remote machines or routers on or for subnets or ethernet networks (switches or hubs) that the traffic routed to and from the victim IP address must pass through the attacker's system.

 [Victim] Poisoned Machine --> [Attacker] Fake Router --> [Internet] Upstream Router --> [Other Hops] --> Destination

This exploitation in the internet protocol can cause high packet loss when the amount of traffic hijacked by the attack exceeds the maximum throughput of networking hardware on the attacker's machine.

Examples

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.