top of page
Writer's pictureCyberwell Academy

What is a man-in-the-middle attack (MITM) ?

A man-in-the-middle attack (MITM) is a type of cyberattack where a malicious actor inserts themselves into a conversation between two parties, impersonates both parties, and gains access to information that the two parties were trying to send to each other.




The attacker is able to intercept, send and receive data without either party knowing that the communication has been compromised. This type of attack is commonly used to steal sensitive information such as usernames, passwords, credit card numbers, and other confidential data.


Types of Man-in-the-Middle Attacks:


There are many types of man in the middle attacks including:


Transparent man in the middle attack :

These attacks allow an attacker to intercept and view all unencrypted traffic. In this case, the attacker is able to see both sides of a conversation and covertly change or add data without detection. This type of attack is most commonly carried out on public Wi-Fi networks.


Non transparent man in the middle attack :

These attacks are more difficult to detect, as the attacker is able to modify the data without the user’s knowledge. This type of attack is usually done by exploiting a vulnerability in the system or application.


Replay attack :

This type of attack involves the attacker capturing data from the network and then replaying it at a later time. This can be used to gain access to sensitive information or to disrupt the network.


Session hijacking :

This type of attack involves the attacker taking over an existing session between two parties. The attacker can then use the session to gain access to sensitive data or to disrupt the network.


DNS spoofing :

This type of attack involves the attacker redirecting traffic from one domain to another. This can be used to gain access to sensitive information or to disrupt the network.


1 view0 comments

Recent Posts

See All

Comments


bottom of page