wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Man In The Middle Attack

profile
Ronak Gala
Feb 27, 2022
0 Likes
0 Discussions
84 Reads

A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required.

Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfers or an illicit password change.

Additionally, it can be used to gain a foothold inside a secured perimeter during the infiltration stage of an advanced persistent threat (APT) assault.

Broadly speaking, a MITM attack is the equivalent of a mailman opening your bank statement, writing down your account details and then resealing the envelope and delivering it to your door.

man in the middle mitm attack

Man in the middle attack example


Comments ()


Sign in

Read Next

BIRYANI ! The history you never knew about

Blog banner

IT Service Continuity Management

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

The Right way of cooking

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Improving defences Proxy Device(defense in depth)

Blog banner

Digital Balance: Keeping Children Mindful in the Screen Age

Blog banner

Steganography

Blog banner

Virtualisation

Blog banner

objectives and function of operating system

Blog banner

Different memory allocation strategies

Blog banner

Uniprocessor scheduling

Blog banner

VIRTUAL MACHINES

Blog banner

Evolution of the Microprocesor

Blog banner

Precision-Recall in Data Science

Blog banner

INSTAGRAM

Blog banner

Fitness

Blog banner

Deadlock and Starvation

Blog banner

EVOLUTION OF THE MIRCOPROCESSOR

Blog banner

Cross site scripting Attack

Blog banner

Evolution of operating system

Blog banner

COMPUTER FORENSICS AND GRAPHICS

Blog banner

MYNTRA

Blog banner

DURGA POOJA

Blog banner

ProofHub

Blog banner

What type of stock broker do I need?

Blog banner

Mental Health

Blog banner

Social Engineering Attacks

Blog banner

Full Disk Encryption

Blog banner

Cycling

Blog banner

Google

Blog banner

Platonic Solids

Blog banner

MACHINE LEARNING

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Principles of Concurrency

Blog banner

Principal of concurrency

Blog banner

Iphone or Android which is the best smartphone?

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

Mobile Transport Layer – Traditional TCP

Blog banner

Linux Threads:

Blog banner

Measuring IT Risk

Blog banner

Financial Fraud Detection

Blog banner