Breaking

Sunday, July 26, 2020

What is MITM Attack?

What is the MITM Attack?


Are you really sure about that is no one is watching you. Is someone can read your messages anonymously? Is someone checks your private videos or something else? The Answer is Yes you have been watching and today, I will tell you about one of the methods that hackers can steal your personal files or data.

 

Hello guys, in this post I will try to Explain to you about Man-In-The-Middle Attack. How Hackers perform this attack? And How they

 

What Is a Man-in-the-Middle Attack?

A man-in-the-middle attack is a type of cyberattack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A man-in-the-middle attack allows a malicious actor to intercept, send and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-middle attacks can be abbreviated in many ways, including MITM, MitM, MiM, or MIM.

 



Example

Suppose Neha wishes to communicate with Ram. Meanwhile, Sohan wishes to intercept the conversation to eavesdrop and optionally to deliver a false message to Ram.

 

First, Neha asks Ram for his public key. If Ram sends his public key to Neha, but Sohan is able to intercept it, an MITM attack can begin. Sohan sends Neha a forged message that appears to originate from Ram but instead includes Sohan's public key.

 

Neha, believing this public key to be Ram's, encrypts her message with Sohan's key and sends the enciphered message back to Ram. Sohan again intercepts, deciphers the message using her private key, possibly alters it if she wants, and re-enciphers it using the public key she intercepted from Ram when he originally tried to send it to Neha. When Ram receives the newly enciphered message, he believes it came from Neha.

 

Neha sends a message to Ram, which is intercepted by Sohan:

     Neha "Hi Ram, it's Neha. Give me your key." →     Sohan     Ram

Sohan relays this message to Ram; Ram cannot tell it is not really from Neha:

     Neha     Sohan "Hi Ram, it's Neha. Give me your key." →     Ram

Ram responds with his encryption key:

     Neha     Sohan     ← [Ram's key] Ram

Sohan replaces Ram's key with her own, and relays this to Neha, claiming that it is Ram's key:

     Neha     ← [Sohan's key] Sohan     Ram

Neha encrypts a message with what she believes to be Ram's key, thinking that only Ram can read it:

     Neha "Meet me at the bus stop!" [encrypted with Sohan's key] →     Sohan     Ram

However, because it was actually encrypted with Sohan's key, Sohan can decrypt it, read it, modify it (if desired), re-encrypt with Ram's key, and forward it to Ram:

     Neha     Sohan "Meet me at the van down by the river!" [encrypted with Ram's key] →     Ram

Ram thinks that this message is a secure communication from Neha.


This example shows the need for Neha and Ram to have some way to ensure that they are truly each using each other's public keys, rather than the public key of an attacker. Otherwise, such attacks are generally possible, in principle, against any message sent using public-key technology. A variety of techniques can help defend against MITM attacks.

 


Types of Man-in-the-Middle Attacks

Email Hijacking – attackers gain access to a user’s email account and watch transactions to and from the account. When the time is right, for instance the user is exchanging funds with another party, the attacker takes advantage of the situation by attempting to intercept the funds by spoofing one or all members of the conversation.

 

Wi-Fi Eavesdropping – a passive way to deploy MITM attacks, Wi-Fi eavesdropping involves cyber hackers setting up public Wi-Fi connections, typically with an unsuspecting name, and gain access to their victims as soon as they connect to the malicious Wi-Fi.

 

Session Hijacking – session hijacking is when an attacker gains access to an online session via a stolen session key or stolen browser cookies.

 

DNS Spoofing – an attacker engages in DNS spoofing by altering a website’s address record within a DNS (domain name server) server. A victim unknowingly visits the fake site and the attacker will attempt to steal their information.

 

IP Spoofing – similar to DNS spoofing, IP Spoofing sees an attacker attempt to divert traffic to a fraudulent website with malicious intent. Instead of spoofing the website’s address record, the attacker disguises an IP (internet protocol) address.


     Here are some tools which can be used to perform MITM Attack:-

  • ArpSpoofing
  • WebSploit
  • WireShark
  • John the Ripper
  • Hydra, and so on

  

I hope you guys like my post. You can also, join us on Youtube and Facebook.

Here is the YouTube Channel Like  :-  Youtube

Here is the Facebook Page Link  :-   Facebook


Thank You! 


No comments:

Post a Comment