wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Man In The Middle Attack

profile
Ronak Gala
Feb 27, 2022
0 Likes
0 Discussions
85 Reads

A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required.

Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfers or an illicit password change.

Additionally, it can be used to gain a foothold inside a secured perimeter during the infiltration stage of an advanced persistent threat (APT) assault.

Broadly speaking, a MITM attack is the equivalent of a mailman opening your bank statement, writing down your account details and then resealing the envelope and delivering it to your door.

man in the middle mitm attack

Man in the middle attack example


Comments ()


Sign in

Read Next

Multiprocessor and scheduling

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Consumer to consumer Business model

Blog banner

I Personally

Blog banner

Hacking Mobile Platforms

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Benefits of yoga and meditation

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Why Summer Break Is Important for Emotional and Cognitive Growth?

Blog banner

Deadlock and Starvation

Blog banner

security requirements for safe e-payment

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

The Future of Web Development in 2026: Trends Every Business Must Know

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Cache memory

Blog banner

Electronic data interchange

Blog banner

Chicken Dum Biryani

Blog banner

INTRODUCTION

Blog banner

MailChimp

Blog banner

Reconnaissance

Blog banner

Direct Memory Access

Blog banner

NETWORK SECURITY RISKS

Blog banner

Real Time Scheduling

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

The launch of UniMap by HERE

Blog banner

PPC Advertising and its Impressive Benefits

Blog banner

Software Piracy & Online Data Protection in Digital World

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

LinkedIn

Blog banner

10 Interesting Facts about Attack on Titan

Blog banner

Trends that began during the pandemic

Blog banner

PPT methodology

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

FASHION

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Article on Fresh Book

Blog banner

Deadlock and Starvation

Blog banner

Deadlock

Blog banner