wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
Sign in

Top Users

profile

Monika Kalala

@monika44
profile

Akbar

@akbar
profile

Saniya Patil

@saniyapatil

Featured Blogs

Mutual exclusion

Blog banner

Population

Blog banner

MoSCoW METHOD IN DATA SCIENCE

Blog banner

Burning Questions

How the points are classified in wisemonkeys ?

Write a short note on system on chip(SOC)?

second battle of panipat was fought between whom?

Contact Us

|

About Us

|

Points nomenclature

|

Terms of service

|

Privacy Policy

|

Cookie Policy

Sahil

user banner image
profile
Sahil @sahil

ResumeBlogsQuestions
profile

Sahil

@sahilSep 02, 2017

Man in the middle attack

******* Man-in-the-middle attack *********** In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. One example of man-in-the-2 attacks is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all relevant messages passing between the two victims and inject new ones.  This is straightforward in many circumstances; for example, an attacker within reception range of an unencrypted wireless access point (Wi-Fi) can insert himself as a man-in-the-middle. As an attack that aims at circumventing mutual authentication, or lack thereof, a man-in-the-middle attack can succeed only when the attacker can impersonate each endpoint to their satisfaction as expected from the legitimate ends. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, TLS can authenticate one or both parties using a mutually trusted certificate authority.   Defense and detection: MITM attacks can be prevented or by two means: authentication & tamper detection. Authentication provides some degree of certainty that a given message has come from a legitimate source. Tamper detection merely shows evidence that a message may have been altered.   Authentication: All cryptographic systems that are secure against MITM attacks provide some method of authentication for messages. Most require an exchange of information (such as public keys) in addition to the message over a secure channel. Such protocols often use key-agreement protocols have been developed, with different security requirements for the secure channel, though some have attempted to remove the requirement for any secure channel at all. A public key infrastructure, such as Transport Layer Security, may harden Transmission Control Protocol against Man-in-the-middle-attacks. In such structures, clients and servers exchange certificates which are issued and verified by a trusted third party called a certificate authority (CA). If the original key to authenticate this CA has not been itself the subject of a MITM attack, then the certificates issued by the CA may be used to authenticate the messages sent by the owner of that certificate. Use of mutual authentication, in which both the server and the client validate the other's communication, covers both ends of a MITM attack, though the default behavior of most connections is to only authenticate the server. Tamper detection: Latency examination can potentially detect the attack in certain situations, such as with long calculations that lead into tens of seconds like hash functions. To detect potential attacks, parties check for discrepancies in response times. For example: Say that two parties normally take a certain amount of time to perform a particular transaction. If one transaction, however, were to take an abnormal length of time to reach the other party, this could be indicative of a third party's interference inserting additional latency in the transaction.   Quantum Cryptography, in theory, provides tamper-evidence for transactions through the no-cloning theorem. Protocols based on quantum cryptography typically authenticate part or all of their classical communication with an unconditionally secure authentication scheme e.g. Wegman-Carter authentication. Forensic analysis : Captured network traffic from what is suspected to be an attack can be analyzed in order to determine whether or not there was an attack and determine the source of the attack, if any. Important evidence to analyze when performing network forensics on a suspected attack includes: - IP address of the server - DNS name of the server - X.509 certificate of the server - Is the certificate self signed? - Is the certificate signed by a trusted CA? - Has the certificate been revoked? - Has the certificate been changed     recently? - Do other clients, elsewhere on the Internet, also get the same certificate? Notable instances : A notable non-cryptographic man-in-the-middle attack was perpetrated by a Belkin wireless network router in 2003. Periodically, it would take over an HTTP connection being routed through it: this would fail to pass the traffic on to destination, but instead itself respond as the intended server. The reply it sent, in place of the web page the user had requested, was an advertisement for another Belkin product. After an outcry from technically literate users, this 'feature' was removed from later versions of the router's firmware. In 2011, a security breach of the Dutch certificate authority DigiNotar resulted in the fraudulent issuing of certificates. Subsequently, the fraudulent certificates were used to perform man-in-the-middle attacks. In 2013, the Nokia's Xpress Browser was revealed to be decrypting HTTPS traffic on Nokia's proxy servers, giving the company clear text access to its customers' encrypted browser traffic. Nokia responded by saying that the content was not stored permanently, and that the company had organizational and technical measures to prevent access to private information.  

2 Discussions
668 Reads
profile

Sahil

@sahilSep 02, 2017

Attack in computing

-----------Attack (computing)- - - - - - In computer and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an Asset. IETF Internet Engineering Task Force defines attack in RFC 2828 as: an assault on system security that derives from an intelligent threat, i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system. Types of attack: An attack can be active or passive. An "active attack" attempts to alter system resources or affect their operation. A "passive attack" attempts to learn or make use of information from the system but does not affect system resources. (E.g., wiretapping.)   A resource (both physical or logical), called an asset, can have one or more vulnerabilities that can be exploited by a threat agent in a threat action. The result can potentially compromises the confidentiality, integrity or availability properties of resources (potentially different that the vulnerable one) of the organization and others involved parties (customers, suppliers).   US Government :   CNSS Instruction No. 4009 dated 26 April 2010 by Committee on National Security Systems of United States of America defines an attack as:   Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.   The increasing dependencies of modern society on information and computers networks (both in private and public sectors, including military) has led to new terms like cyber attack and cyberwarfare.   CNSS Instruction No. 4009 define a cyber attack as: An attack, via cyberspace, targeting an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling computing environment/infrastructure; or destroying the integrity of the data or stealing controlled information.  

1 Discussions
495 Reads