Man in the Middle Attack

From Computing and Software Wiki

(Difference between revisions)
Jump to: navigation, search
Line 1: Line 1:
 +
[[Image:Man_in_the_Middle.jpg|frame|Man in the Middle Example]]
Man in the Middle Attacks (sometimes MITM) are attacks where the attacker intercepts communication between two parties, forwarding the communication as if the attacker were not present. The name is derived from the popular game Man in the Middle.
Man in the Middle Attacks (sometimes MITM) are attacks where the attacker intercepts communication between two parties, forwarding the communication as if the attacker were not present. The name is derived from the popular game Man in the Middle.
It is also referred to as a fire-brigade or bucket brigade attack based on the method for putting out a fire.
It is also referred to as a fire-brigade or bucket brigade attack based on the method for putting out a fire.
Lastly it is referred to as a Janus attack in reference to the roman two-headed god of gates.
Lastly it is referred to as a Janus attack in reference to the roman two-headed god of gates.
-
[[Image:Man_in_the_Middle.jpg]]
+
==Example Attacks==
 +
Many different attack types exist
 +
 
 +
 
 +
==See Also==
 +
Information Security Topics:<BR>
 +
- [[Mitnick Attack]]<BR>
 +
- [[IP Spoofing]]<BR>
 +
- [[Piggybacking]]<BR>
 +
- [[Phishing]]<BR>
 +
- [[Operating Systems Security]]<BR>
 +
- [[Information security awareness]]<BR>
 +
- [[Network stack (dode) - attack patterns on each layer %26 how to defend it]] <BR>
 +
 
 +
==External Links==
 +
* [http://cwe.mitre.org/data/definitions/300.html CWE-300: Channel Accessible by Non-Endpoint (aka 'Man-in-the-Middle')]
 +
 
 +
 
 +
==References==
 +
{{Reflist}}
 +
 
 +
----
 +
--[[User:Heifetj|Heifetj]] 03:17, 6 April 2009 (EDT)

Revision as of 07:17, 6 April 2009

Man in the Middle Example

Man in the Middle Attacks (sometimes MITM) are attacks where the attacker intercepts communication between two parties, forwarding the communication as if the attacker were not present. The name is derived from the popular game Man in the Middle. It is also referred to as a fire-brigade or bucket brigade attack based on the method for putting out a fire. Lastly it is referred to as a Janus attack in reference to the roman two-headed god of gates.

Contents

Example Attacks

Many different attack types exist


See Also

Information Security Topics:
- Mitnick Attack
- IP Spoofing
- Piggybacking
- Phishing
- Operating Systems Security
- Information security awareness
- Network stack (dode) - attack patterns on each layer & how to defend it

External Links


References

Template loop detected: Template:Reflist


--Heifetj 03:17, 6 April 2009 (EDT)

Personal tools