Giter Site home page Giter Site logo

maninthemiddleattack's Introduction

Man In The MiddleAttack

Pre-Final Year Mini Project. I. INTRODUCTION A Man-in-the-Middle attack (MitM) is where a malicious Third party takes control of a communication channel between Two or more endpoints by intercepting and forwarding the Traffic in transit. An attacker in the middle has the capability of harming the confidentiality, integrity, and availability of the User’s content, by eavesdropping, manipulating, crafting, and dropping traffic on the network. In general, the MitM attack model on a local area network (LAN) has three steps: (1) gain access to the network, (2) intercept traffic in transit, and (3) manipulate, craft, or drop traffic. Depending on the scenario, access can be achieved by connecting to a public Wi-Fi access point (e.g. at a café, airport...) or by connecting physically to an exposed network cable or network switch. The attacker can also conduct this Attack remotely via a malware which has infected a trusted Computer within the existing network .After gaining access, Interception can be achieved by exploiting known vulnerabilities in network protocols. For example, the attacker can poison a host’s address resolution protocol (ARP) table to capture Local traffic, or spoofing a domain name server (DNS) to intercept all web traffic . The attacker can easily exploit these vulnerabilities with free tools which work out-of thebox such as Ettercap, Cain and Abel, Evilgrade, arpspoof, dsniff, and many others. Although MitM attacks on LANs have been known for some time, they are still considered a significant threat and have gained academic attention over the years. This is likely because the attack is relatively easy to achieve, yet challenging to detect . Encryption can protect the integrity and confidentiality of the traffic in transit. However, according to, 30% of the world’s web traffic is not encrypted. Furthermore, in many cases networked systems do not encrypt their traffic by default (e.g., SCADA control system. Moreover, even if the traffic is encrypted, encryption protocols may have flaws be misconfigured, or simply left out by a manufacturer (e.g. CVE-2017-15643). We also note that LAN-based MitM attacks are used in APTs to achieve lateral movement. Therefore, there is a need for detecting the presence of a MitM, even when encryption is employed.

maninthemiddleattack's People

Contributors

rohitjain25 avatar

Stargazers

 avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.