Skip to main content

Man in the middle attack types

Types Of Man-In-The-Middle Attacks :

Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now. 

Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data.

So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful...................

1⃣ IP spoofing:

 

Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home. 

By spoofing an IP address, an attacker can trick you into thinking you’re interacting with an internet site or someone you’re not, perhaps giving the attacker access to information you’d otherwise not share.


2⃣ DNS spoofing:

Domain Name Server, or DNS, spoofing may be a technique that forces a user to a fake website instead of the important one the user intends to go to . If you're a victim of DNS spoofing, you'll think you’re visiting a secure , trusted website when you’re actually interacting with a fraudster. The perpetrator’s goal is to divert traffic from the real site or capture user login credentials.


3⃣ HTTPS spoofing:

When doing business on the internet, seeing “HTTPS” in the URL, rather than “HTTP” is a sign that the website is secure and can be trusted. In fact, the “S” stands for “secure.” An attacker can fool your browser into believing it’s visiting a trusted website when it’s not. By redirecting your browser to an unsecure website, the attacker can monitor your interactions thereupon website and possibly steal personal information you’re sharing.


4⃣ SSL hijacking:

When your device connects to an unsecure server — indicated by “HTTP” — the server can often automatically redirect you to the secure version of the server, indicated by “HTTPS.” A connection to a secure server means standard security protocols are in situ , protecting the info you share thereupon server. SSL stands for Secure Sockets Layer, a protocol that establishes encrypted links between your browser and therefore the web server.
In an SSL hijacking, the attacker uses another computer and secure server and intercepts all the knowledge passing between the server and therefore the user’s computer.


5⃣ Email hijacking:

Cyber criminals sometimes target email accounts of banks and other financial institutions. Once they gain access, they can monitor transactions between the institution and its customers. The attackers can then spoof the bank’s email address and send their own instructions to customers. This convinces the customer to follow the attackers’ instructions instead of the bank’s. As a result, an unwitting customer may find yourself putting money within the attackers’ hands.
 

6⃣ Wi-Fi eavesdropping:

Cyber criminals can set up Wi-Fi connections with very legitimate sounding names, similar to a nearby business. Once a user connects to the fraudster’s Wi-Fi, the attacker are going to be ready to monitor the user’s online activity and be ready to intercept login credentials, payment card information, and more. This is only one of several risks related to using public Wi-Fi. You can learn more about such risks here.


7⃣ Stealing browser cookies:

To understand the danger of stolen browser cookies, you would like to know what one is. A browser cookie may be a small piece of data an internet site stores on your computer.

For example, an online retailer might store the personal information you enter and shopping cart items you’ve selected on a cookie so you don’t have to re-enter that information when you return.
A cyber criminal can hijack these browser cookies. Since cookies store information from your browsing session, attackers can gain access to your passwords, address, and other sensitive information.


Thanks for reading this blog!!!!!!!!!

Comments

Popular Posts

Solution | Secure Workloads in Google Kubernetes Engine: Challenge Lab | 2022

  Task 0: Download the necessary files :   gsutil cp gs://spls/gsp335/gsp335.zip . unzip gsp335.zip Task - 1: Setup cluster gcloud container clusters create <cluster-name> \    --zone us-central1-c \    --machine-type n1-standard-4 \    --num-nodes 2 \    --enable-network-policy gcloud sql instances create <your-sql-instance-name> --region us-central1 Task - 2: Setup wordpress: Create database - wordpress Go to the SQL -> open the  created instance (wordpress-db-387) -> then database -> Create database  Database name :wordpress Create -> users-> add user Account User name: wordpress Add Add user - wordpress (no password) Service account gcloud iam service-accounts create <your-service-account- credentials> gcloud projects add-iam-policy-binding $DEVSHELL_PROJECT_ID \    --member="serviceAccount:< your-service-account- credentials>@$ DEVSHELL_ PROJECT_ID.i...

why visiting darkweb is not too easy?

DARK WEB :       Today we will talk about Dark-Web ,   the Dark-Web is a WWW(World wide web) content that exists on the internet but we need specific software, system configurations or authorized access to see or make changes in this content. Dark-web is just a part of the internet where 90% of internet data is available right now. The Dark-Web contents are not shown by normal search engines like Google , Bing or other search engines.          The dark-web include small peer to peer and friend to friend networks, as well as large, popular networks such as Tor, Freenet etc. operated by public organizations and individuals.  Users of the dark web refer to the regular web as clean net due to its unencrypted nature. The Tor dark web or onion browsing uses the traffic anonymization technique of onion-routing in the network's top-level-domain suffix .onion REAL WORLD:  If we talk about real world scenarios ...

Some useful shortcuts of Libre Office Writer

Ctrl+A   Select All Ctrl+J    Justify Ctrl+D Double Underline Ctrl+E Centered Ctrl+F Find and Replace Ctrl+Shift+P Superscript Ctrl+L Align Left Ctrl+R Align Right Ctrl+Shift+B Subscript Ctrl+Y Redo last action Ctrl+0 (zero) Apply Default   paragraph style Ctrl+1 Apply Heading 1 paragraph style Ctrl+2 Apply Heading 2 paragraph style Ctrl+3 Apply Heading 3 paragraph style Ctrl+5 1.5 Line Spacing Ctrl+ Plus Key(+) Calculates the selected text and copies the result to the clipboard. Ctrl+Hyphen(-) Custom hyphens; hyphenation set by you. Ctrl+Shift+minus sign (-) Non-breaking dash (is not used for hyphenation) Ctrl+multiplication sign * (only on number pad) Run macro field Ctrl+Shift+Space Non-breaking spaces. Non-breaking spaces are not used for hyphenation and are not expanded if the text is justified. Shift+Enter Line break without paragraph change Ctrl+Enter Manual page break Ctrl+Shift+Enter Column break in multicolumnar texts Alt+Enter I...

A Digital Computer

 A digital computer is a digital system that performs various computational tasks. The word "Digital" implies that the information in the computer is represented by variables that take a limited number of discrete values. These values are processed internally by components that can maintain a limited number of discrete states. These discrete values are taken by the decimal digits 0 to 9.  The first electronic digital systems was developed at 1940s late, it was primarily only used for some numerical computations.  As we all know a digital computer uses binary number system & it can only understand a binary number. And a binary number has only 2 digits 0 & 1 . Let me tell you one more interesting thing is that a binary digit is called "bit" here. That means if we use 0 it means its a bit, and vise versa.  In a digital computer all information is only represented in group of bits. After using various programming techniques & some algorithms, these grou...

Types of Softwares

Software generally categorized into two types, which are as follows : System Softwares Application Softwares.        System Softwares:      A system software is a set of programs which is designed to control different-different operations and more extend processing capabilities of a computer system. It can perform these functions one or more depending on program requirements on a given task. Supports the development of other application software. Supports the execution of other application software. Handles the effective & efficient use of various hardware resources, such as CPU, memory peripherals etc.  Controls and communicate with the operation of peripheral devices such as printer disk, tape etc.     And system software makes the operation of a computer system more effective and efficient as we can see in its functions. It help the hardware components work together. These programme which are included in a system software p...