wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Man In The Middle Attack

profile
Ronak Gala
Feb 27, 2022
0 Likes
0 Discussions
85 Reads

A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required.

Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfers or an illicit password change.

Additionally, it can be used to gain a foothold inside a secured perimeter during the infiltration stage of an advanced persistent threat (APT) assault.

Broadly speaking, a MITM attack is the equivalent of a mailman opening your bank statement, writing down your account details and then resealing the envelope and delivering it to your door.

man in the middle mitm attack

Man in the middle attack example


Comments ()


Sign in

Read Next

OPERATING SYSTEM

Blog banner

Basic Security For SOAP Services

Blog banner

Deadlock

Blog banner

Memory Management in Operating System

Blog banner

Components of GIS

Blog banner

File and File System Structure

Blog banner

Service Design Principles

Blog banner

File sharing

Blog banner

How to insert contacts in zoho crm using php

Blog banner

Deadlock in Operating System

Blog banner

Operating system

Blog banner

Why Soft Skills Matter as Much as Grades?

Blog banner

LiquidPlanner

Blog banner

This Windows 11 encryption bug may cause data damage

Blog banner

Memory Management

Blog banner

Explain Multiprocessors

Blog banner

File Management In OS

Blog banner

Culture Of Ladakh

Blog banner

Concurrency and Deadlocks

Blog banner

A Heartfelt Act of Kindness

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Evolution of Operating System

Blog banner

FIREWALL

Blog banner

E-learning

Blog banner

Record Blocking

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Linux 94

Blog banner

Proof-of-Stake (PoS)

Blog banner

Evolution of operating systems

Blog banner

Compromising Mobile Platforms

Blog banner

Zero-Day Attack

Blog banner

Traveling

Blog banner

Modern Operating Systems.

Blog banner

The Role of Frontline Managers in Driving Workplace Performance and Customer Satisfaction

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

FRIENDSHIP

Blog banner

What is Virtual Memory

Blog banner

Explain website hacking issues

Blog banner

Importance Of Yoga.

Blog banner

Quality check in IT services

Blog banner

Preparing Students for Higher Education: How International Schools Shape Future Success

Blog banner

Outlook.com

Blog banner