Results 1 to 12 of 12

Thread: MITM Attack

  1. #1
    Join Date
    Jun 2014
    Posts
    28

    Default MITM Attack

    What is Man In The Middle Attack? Is it a type of cyber-attack?

  2. #2
    Join Date
    Apr 2015
    Posts
    168

    Default

    From what I know, this term is related to cyber threats wherein the person who carries out the attack tries to intercept the communication between two parties.

  3. #3

    Default

    Real-time transaction process are sure to get exploited with the MITM attack. So, one needs to be careful while doing the transactions.

  4. #4

    Default

    How can we become the victim of this attack?

  5. #5

    Default

    Online shopping is the simplest way through which you can be the target of MITM attack, especially during holiday season.

  6. #6
    Join Date
    Jul 2011
    Posts
    105

    Default

    You can also become a victim of Man-in-the-Brower (MITM type) attack through malware that has been installed on the victim’s system. The malware is capable of modifying online banking transactions, so the information is displayed by the browser and that sent to the bank is different.

  7. #7
    Join Date
    Apr 2011
    Posts
    125

    Default

    You need to opt for a two-factor authentication while dealing with online banking transactions. Also, don't use your home or work computer for online transactions because that might be unsafe.

  8. #8
    Join Date
    Apr 2011
    Posts
    216

    Default

    If you are using an app on your desktop or mobile, you might be the victim of MITA (Man-in-the-Middle) attack. With the MITA, the attacker can insert a certificate signed by him and start communicating with the app directly.

  9. #9
    Join Date
    Jul 2011
    Posts
    137

    Default

    Cloud security being the significant point of discussion, MITM attack is also possible in Cloud. to exploit the session management is the aim of the Man-in-the-Cloud attack.

  10. #10

    Default

    This means cloud isn't safe too. We need to be alert while selecting the cloud provider. If this is the case, even IoT wouldn't be safe, right?

  11. #11

    Default

    Have you heard about Man-in-the-App attack? The mobile apps you are using aren't secure. The attacker can insert a certificate signed by him and start communicating with the app directly. This is the point when the hacker can intercept the app data, impersonate the user on app or steal information.

  12. #12

    Default

    But don't get confused between Man-in-the-App and Man-in-the-Mobile attack. These are totally different.

    Man-in-the Mobile - The prime objective of this attack is to help hackers get an access to a two-factor authentication protection on online account.

    Man-in-the-App - The motive is to impersonate the user on app or steal information.
    BODHost.com: | Dedicated Server Hosting | Cloud Server Hosting
    Ph. : +1.866-662-0909 | Email : [email protected]

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •