SlideShare uma empresa Scribd logo
1 de 19
Man-In-The-Middle Attacks
Definition
• Man-in-the-Middle (MitM) attacks happen when traffic
between two parties is observed or manipulated by an
unknown third party.
• A MitM attack is a cybercrime method used to steal
personal information or login credentials. Cyber
criminals also use MitM attacks as a means to spy on,
corrupt information, or disrupt communications
between two parties.
2
Since the 1980s,
MitM attacks
have been used
to infiltrate
traffic between
innocent parties.
Methods
Man-in-the-Middle attacks can happen in a number of
ways:
• Types of Spoofing (IP, DNS, HTTPS)
• Hijacking (Secure Socket Layer, Email)
• Wi-Fi Eavesdropping
• Theft of Browsing Cookies
3
Man-in-the-Browser:
• When a Man-in-the-Browser attack takes place, the
attacker uses a Phishing method in order to
administer malware to a device.
• Malware is software meant to damage a network,
server or personal computer.
4
Phishing is a
method of
sending
fraudulent
emails or text
messages to
trick a user into
revealing
personal
information.
Man-in-the-Browser Continued
• A Man-in-the-Browser attack happens when malware
installs itself on a victim’s browser in order to record
information sent between targeted websites and the
user.
• Online banking institutions are prone to this form of
cybercrime.
5
Example of Man-in-the-Browser
6
IP Spoofing
• All devices that connect to the internet have an IP
Address.
• Spoofing happens when someone or something
impersonates a trusted source.
• Attackers use IP Spoofing in order to deceive users
into revealing sensitive information by “spoofing”
their IP and posing as a website or someone familiar.
7
An IP Address is
like your home
address.
Example of IP Spoofing
8
DNS Spoofing
• DNS refers to “Domain Name Server/System”. The
DNS system converts names to IP Addresses.
• When Spoofing a DNS, a user is forced to an imitation
website, similar to the one intended to be viewed.
• The goal of the attacker is to divert traffic or retrieve
login credentials.
9
Example: The
DNS will return
the IP address of
a visited website
when it is typed
into a browser.
Example of DNS Spoofing
10
HTTPS Spoofing
• HTTPS stands for Hypertext Transfer Protocol Secure.
This protocol is used by the Web to format and
transmit messages.
• Ensure that when visiting a website, the URL indicates
that it uses “https” rather than “http”.
11
HTTPS Spoofing
• In HTTPS Spoofing, the attacker manipulates the
browser into believing it is visiting a trusted website.
• After redirecting your browser, the attacker uses the
vulnerable website to monitor communication and
steal shared information.
12
SSL Hijacking
• SSL stands for Secure Sockets Layer, which was a
protocol developed in order to communicate over the
internet securely.
• Sometimes when a device visits an unsecure website
(http), it is automatically redirected to the secure
version (https).
• An attacker utilizes a computer and secure server to
reroute information of a user right before connection
to a legitimate server, this is SSL Hijacking.
13
Email Hijacking
• Email Hijacking occurs when attackers target financial
organizations for email information.
• After obtaining access to email accounts, attackers
can monitor all financial transactions.
• Attackers then follow up by “spoofing” the financial
institution’s email and possibly providing users with
instructions that would result in the attacker receiving
funds.
14
Wi-fi Eavesdropping
• Wi-Fi connections can be configured and appear to
have a valid name, such as the Wi-fi of a favourite
coffee shop.
• If a user connects to the fraudulent Wi-Fi connection,
the user’s online activities can be observed and
personal information like banking cards can be
attained.
15
Precautions
should be taken
when connecting
to public Wi-Fi
connections.
Example of Wi-fi Eavesdropping
16
Precautions
should be taken
when connecting
to public Wi-Fi
connections.
Browser Cookies
• A browser cookie is a small piece of
data stored by the user’s web
browser. This data is used to track
browsing sessions.
• If browsing data is stored in a cookie
and the browser cookie is hijacked,
cybercriminals may be able to gain
passwords, addresses and other
sensitive information.
17
Protection
• Ensure that the browser is using “https” when
browsing the web.
• Be on alert of Phishing emails that request credentials
to be updated.
18
Protection Continued
• Refrain from connecting to public Wi-Fi connections
without a VPN.
• Make use of internet security applications to thwart
MitB attacks.
19

Mais conteúdo relacionado

Semelhante a Man in the Middle.pptx

Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...GIRISHKUMARBC1
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Securitypadmeshagrekar
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attacktaufiq463421
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber security best practices power point presentation
Cyber security best practices power point presentationCyber security best practices power point presentation
Cyber security best practices power point presentationAbcdEfg576575
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attackmarada0033
 

Semelhante a Man in the Middle.pptx (20)

Man in the middle
Man in the middleMan in the middle
Man in the middle
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
 
HTTPS
HTTPSHTTPS
HTTPS
 
Unit 3B.pdf
Unit 3B.pdfUnit 3B.pdf
Unit 3B.pdf
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Phishing
PhishingPhishing
Phishing
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber security best practices power point presentation
Cyber security best practices power point presentationCyber security best practices power point presentation
Cyber security best practices power point presentation
 
E commerce
E commerceE commerce
E commerce
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Internet security
Internet securityInternet security
Internet security
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
 

Último

BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...lizamodels9
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 

Último (20)

BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
Call Girls From Raj Nagar Extension Ghaziabad❤️8448577510 ⊹Best Escorts Servi...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 

Man in the Middle.pptx

  • 2. Definition • Man-in-the-Middle (MitM) attacks happen when traffic between two parties is observed or manipulated by an unknown third party. • A MitM attack is a cybercrime method used to steal personal information or login credentials. Cyber criminals also use MitM attacks as a means to spy on, corrupt information, or disrupt communications between two parties. 2 Since the 1980s, MitM attacks have been used to infiltrate traffic between innocent parties.
  • 3. Methods Man-in-the-Middle attacks can happen in a number of ways: • Types of Spoofing (IP, DNS, HTTPS) • Hijacking (Secure Socket Layer, Email) • Wi-Fi Eavesdropping • Theft of Browsing Cookies 3
  • 4. Man-in-the-Browser: • When a Man-in-the-Browser attack takes place, the attacker uses a Phishing method in order to administer malware to a device. • Malware is software meant to damage a network, server or personal computer. 4 Phishing is a method of sending fraudulent emails or text messages to trick a user into revealing personal information.
  • 5. Man-in-the-Browser Continued • A Man-in-the-Browser attack happens when malware installs itself on a victim’s browser in order to record information sent between targeted websites and the user. • Online banking institutions are prone to this form of cybercrime. 5
  • 7. IP Spoofing • All devices that connect to the internet have an IP Address. • Spoofing happens when someone or something impersonates a trusted source. • Attackers use IP Spoofing in order to deceive users into revealing sensitive information by “spoofing” their IP and posing as a website or someone familiar. 7 An IP Address is like your home address.
  • 8. Example of IP Spoofing 8
  • 9. DNS Spoofing • DNS refers to “Domain Name Server/System”. The DNS system converts names to IP Addresses. • When Spoofing a DNS, a user is forced to an imitation website, similar to the one intended to be viewed. • The goal of the attacker is to divert traffic or retrieve login credentials. 9 Example: The DNS will return the IP address of a visited website when it is typed into a browser.
  • 10. Example of DNS Spoofing 10
  • 11. HTTPS Spoofing • HTTPS stands for Hypertext Transfer Protocol Secure. This protocol is used by the Web to format and transmit messages. • Ensure that when visiting a website, the URL indicates that it uses “https” rather than “http”. 11
  • 12. HTTPS Spoofing • In HTTPS Spoofing, the attacker manipulates the browser into believing it is visiting a trusted website. • After redirecting your browser, the attacker uses the vulnerable website to monitor communication and steal shared information. 12
  • 13. SSL Hijacking • SSL stands for Secure Sockets Layer, which was a protocol developed in order to communicate over the internet securely. • Sometimes when a device visits an unsecure website (http), it is automatically redirected to the secure version (https). • An attacker utilizes a computer and secure server to reroute information of a user right before connection to a legitimate server, this is SSL Hijacking. 13
  • 14. Email Hijacking • Email Hijacking occurs when attackers target financial organizations for email information. • After obtaining access to email accounts, attackers can monitor all financial transactions. • Attackers then follow up by “spoofing” the financial institution’s email and possibly providing users with instructions that would result in the attacker receiving funds. 14
  • 15. Wi-fi Eavesdropping • Wi-Fi connections can be configured and appear to have a valid name, such as the Wi-fi of a favourite coffee shop. • If a user connects to the fraudulent Wi-Fi connection, the user’s online activities can be observed and personal information like banking cards can be attained. 15 Precautions should be taken when connecting to public Wi-Fi connections.
  • 16. Example of Wi-fi Eavesdropping 16 Precautions should be taken when connecting to public Wi-Fi connections.
  • 17. Browser Cookies • A browser cookie is a small piece of data stored by the user’s web browser. This data is used to track browsing sessions. • If browsing data is stored in a cookie and the browser cookie is hijacked, cybercriminals may be able to gain passwords, addresses and other sensitive information. 17
  • 18. Protection • Ensure that the browser is using “https” when browsing the web. • Be on alert of Phishing emails that request credentials to be updated. 18
  • 19. Protection Continued • Refrain from connecting to public Wi-Fi connections without a VPN. • Make use of internet security applications to thwart MitB attacks. 19

Notas do Editor

  1. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
  2. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
  3. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
  4. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
  5. References: https://www.imperva.com/learn/application-security/man-in-the-middle-attack-mitm/
  6. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
  7. References: https://en.wikipedia.org/wiki/IP_address_spoofing
  8. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
  9. References: https://www.imperva.com/learn/application-security/dns-hijacking-redirection/
  10. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
  11. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
  12. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
  13. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html https://unit42.paloaltonetworks.com/threat-brief-conversation-hijacking-spear-phishing/
  14. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
  15. References: https://due.com/blog/12-reasons-never-use-public-wi-fi/
  16. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html https://www.wikiwand.com/en/HTTP_cookie
  17. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html
  18. References: https://us.norton.com/internetsecurity-wifi-what-is-a-man-in-the-middle-attack.html https://www.csoonline.com/article/3340117/what-is-a-man-in-the-middle-attack-how-mitm-attacks-work-and-how-to-prevent-them.html