wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Man In The Middle Attack

profile
Ronak Gala
Feb 27, 2022
0 Likes
0 Discussions
85 Reads

A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required.

Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfers or an illicit password change.

Additionally, it can be used to gain a foothold inside a secured perimeter during the infiltration stage of an advanced persistent threat (APT) assault.

Broadly speaking, a MITM attack is the equivalent of a mailman opening your bank statement, writing down your account details and then resealing the envelope and delivering it to your door.

man in the middle mitm attack

Man in the middle attack example


Comments ()


Sign in

Read Next

What is E-commerce

Blog banner

Twisted world

Blog banner

Online Education

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

Digital Footprints An Emerging Dimension of Digital Inequality

Blog banner

Buffers in Operating Systems

Blog banner

The most common internet security threats

Blog banner

Fault tolerance

Blog banner

Deadlock

Blog banner

OPERATING SYSTEM

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Asana

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

Starvation

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

Linux Threads:

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

INTRODUCTION TO C#

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

Traditional UNIX Scheduling

Blog banner

Virtual Machine

Blog banner

Os assignment

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Principal of concurrency

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Wedding photographer

Blog banner

What is Segmentation?

Blog banner

Threads and concurrency

Blog banner

Real Time Scheduling

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

Security issues

Blog banner

The Evolution of the Microprocessor ~ Aditya Pai

Blog banner

38_Network Sniffing Techniques_SBC

Blog banner

Retiring ISS

Blog banner

Deadlocks in Operating System

Blog banner

Review on Cyber Forensics and its Analysis Tools

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

K-means use cases

Blog banner

Teenagers of Today

Blog banner

UniProcessor Scheduling

Blog banner

Ola

Blog banner