Skip to main content

Man in the middle attack types

Types Of Man-In-The-Middle Attacks :

Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now. 

Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data.

So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful...................

1⃣ IP spoofing:

 

Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home. 

By spoofing an IP address, an attacker can trick you into thinking you’re interacting with an internet site or someone you’re not, perhaps giving the attacker access to information you’d otherwise not share.


2⃣ DNS spoofing:

Domain Name Server, or DNS, spoofing may be a technique that forces a user to a fake website instead of the important one the user intends to go to . If you're a victim of DNS spoofing, you'll think you’re visiting a secure , trusted website when you’re actually interacting with a fraudster. The perpetrator’s goal is to divert traffic from the real site or capture user login credentials.


3⃣ HTTPS spoofing:

When doing business on the internet, seeing “HTTPS” in the URL, rather than “HTTP” is a sign that the website is secure and can be trusted. In fact, the “S” stands for “secure.” An attacker can fool your browser into believing it’s visiting a trusted website when it’s not. By redirecting your browser to an unsecure website, the attacker can monitor your interactions thereupon website and possibly steal personal information you’re sharing.


4⃣ SSL hijacking:

When your device connects to an unsecure server — indicated by “HTTP” — the server can often automatically redirect you to the secure version of the server, indicated by “HTTPS.” A connection to a secure server means standard security protocols are in situ , protecting the info you share thereupon server. SSL stands for Secure Sockets Layer, a protocol that establishes encrypted links between your browser and therefore the web server.
In an SSL hijacking, the attacker uses another computer and secure server and intercepts all the knowledge passing between the server and therefore the user’s computer.


5⃣ Email hijacking:

Cyber criminals sometimes target email accounts of banks and other financial institutions. Once they gain access, they can monitor transactions between the institution and its customers. The attackers can then spoof the bank’s email address and send their own instructions to customers. This convinces the customer to follow the attackers’ instructions instead of the bank’s. As a result, an unwitting customer may find yourself putting money within the attackers’ hands.
 

6⃣ Wi-Fi eavesdropping:

Cyber criminals can set up Wi-Fi connections with very legitimate sounding names, similar to a nearby business. Once a user connects to the fraudster’s Wi-Fi, the attacker are going to be ready to monitor the user’s online activity and be ready to intercept login credentials, payment card information, and more. This is only one of several risks related to using public Wi-Fi. You can learn more about such risks here.


7⃣ Stealing browser cookies:

To understand the danger of stolen browser cookies, you would like to know what one is. A browser cookie may be a small piece of data an internet site stores on your computer.

For example, an online retailer might store the personal information you enter and shopping cart items you’ve selected on a cookie so you don’t have to re-enter that information when you return.
A cyber criminal can hijack these browser cookies. Since cookies store information from your browsing session, attackers can gain access to your passwords, address, and other sensitive information.


Thanks for reading this blog!!!!!!!!!

Comments

Popular Posts

Types of operating systems

Today there are lot of operating systems in the internet but actually they are only based on these main operating systems. What we see on internet is that windows is an OS, Linux is an OS but actually it is not really true. These are true only in simple understanding but when we explore computers more then we see there are lot of types of operating systems available in the market. These are written below...... Batch Operating System Multi-programming OS. Time-sharing or multitasking operating systems Distributed operating System Network operating System Real Time operating System Hard real--time systems Soft real--time systems Batch operating system: These operating system can not interact directly with the computer. Batch processing is a technique in which an Operating System collects the programs and data together in a batch before processing starts.   Multi-programming OS: These type of OS are able to run multiple jobs simultaneously in the memory. For it, memory is considered a...

Know Operating Systems (Briefly)

OPERATING SYSTEM :     Today's lot of operating systems have arrived in the marketplace, but some OS gets failed because of their specifications or trends. Let me tell you what is an Operating System in short " an operating system is just a system software which help us to communicate with a machine using graphical or command line interface."     That's means when someone using his/her smartphone or computer or any type of device that's sure this device has an operating system and there is a proper way to use this device. Every Operating system has its own way or type of using it.    An OS is also making a vital role in the device because there are lot of things in a device which depends on the OS like bluetooth-connectivity, wireless-connections, display and many more things.   WORKING PROCESS :   Basically an OS is a system software so it contains all information about the hardware of this device.    Now...

A technical preview of an Operating System

Operating System (OS): An Operating system consists of a set of programs which controls, co-ordinates and supervises the activities of the various components of a computer system. Its function is to link between the computer hardware and the user. An operating system is a software or a series of programmes, which performs various types of functions in order to manage and organize file so". Objectives:  There are lot of objectives of an operating system, actually it covers the birth of a perfect operating system. A user is just like a wanting animal they just want everything. But as a developer we are just tying to make our software more & more better as per user requests. These are some main objectives ------ To describe the basic organization of computer systems. To provide a grand tour of the major components of operating systems. Provide more convenient environment for users. Provide maximum utilized performance to users as per hardware existance. Computer Startup: When a c...

Application Softwares (types of softwares)

  Application Software:   An application software always works under a system software. These softwares are generally a set of one or more programmes, designed to solve a specific problem, or do a specific task e.g. An application software for payroll processing produces pay slips as the major output, and an application software for processing examination results produces mark sheets as the major output along with some other statistical reports.    And also if a person is writing a program to solve his/her personal and particular problems is also comes under the application software. These programs included in an application software package are called application programmes and who made these programs are also known as application programmers. The most commonly known application software are 1. Word Processing Software: A word processing software enables us to make use of a computer system for creating editing, viewing, formatting, storing retrieving and painting ...

Solution | Secure Workloads in Google Kubernetes Engine: Challenge Lab | 2022

  Task 0: Download the necessary files :   gsutil cp gs://spls/gsp335/gsp335.zip . unzip gsp335.zip Task - 1: Setup cluster gcloud container clusters create <cluster-name> \    --zone us-central1-c \    --machine-type n1-standard-4 \    --num-nodes 2 \    --enable-network-policy gcloud sql instances create <your-sql-instance-name> --region us-central1 Task - 2: Setup wordpress: Create database - wordpress Go to the SQL -> open the  created instance (wordpress-db-387) -> then database -> Create database  Database name :wordpress Create -> users-> add user Account User name: wordpress Add Add user - wordpress (no password) Service account gcloud iam service-accounts create <your-service-account- credentials> gcloud projects add-iam-policy-binding $DEVSHELL_PROJECT_ID \    --member="serviceAccount:< your-service-account- credentials>@$ DEVSHELL_ PROJECT_ID.i...