SlideShare a Scribd company logo
3
Most read
6
Most read
23
Most read
Man In-The Middle
Attack
MITM
Man in The Middle Attack
What is MITM ?
 A man-in-the-middle (MITM) attack is a form of
eavesdropping where communication between two users is
monitored and modified by an unauthorized party.
Generally, the attacker actively eavesdrops by
intercepting a public key message exchange and
retransmits the message while replacing the requested
key with his own.
MITM attack is also known as:
 Bucket-brigade attack
 Fire brigade attack
 Monkey-in-the-middle attack
 Session hijacking
 TCP hijacking
 TCP session hijacking
Name Origin:
 The name "Man-in-the-Middle" is derived from the
basketball scenario where two players intend to pass a
ball to each other while one player between them tries to
seize it. MITM attacks are sometimes referred to as
"bucket brigade attacks" or "fire brigade attacks." Those
names are derived from the fire brigade operation of
dousing off the fire by passing buckets from one person to
another between the water source and the fire.
How Does It Work?
 Man in the middle is known most to others as "session
hijacking" and to general public as "hijacking". These
hackers are primarily targeting specific data about the
transactions on computers. This can be anything from an
email to a bank transaction that said the hackers begin
their investigation of the party of interest.
A BASIC ILLUSTRATION
What is wireless
 More or less it is a radio signal that carries a digital signal.
Sender (Router)
Receiver
Project Description
 Configure a wireless network
 Perform a Man-in-the-Middle (MITM) attack over a wireless
network
 MITM is an attack in which an attacker is able to read,
insert and modify at will, messages between two
parties without either party knowing that the link
between them has been compromised. (Wikipedia)
Log in to The Router Admin
 Using IE we connected
to the gateway(IP
Address:192.168.1.1)
and entered the default
password
WEP Configuration
 Changed SSID, changed default username and password to
log in and enabled WEP with one key.
 Chanel 6 was used instead of 11 because the router was
firmware routed to number 6 only.
Securing Our Wireless Network
 We are then able to
see and connect to
the network we have
configured
MAC Filtering
Turned on MAC filtering and cloned the
known computer and only allowed it
MAN IN THE MIDDLE
How It Works?
 The MitM poisons the ARP cache of the victim and the
server/gateway/switch
 So the victim computer then thinks the hacker's ARP
address is the gateway’s.
 The gateway thinks the hacker’s ARP address is the victim
computer’s.
 All data is redirected through the listening system.
MAN IN THE MIDDLE
Basic Attacks
 Read all clear text information passed between the hosts
(i.e., browser requests, username/passwords)
 Log/trap all data packets
 Packet injection
(all these attacks can be performed through traffic dumps
and setting your NIC to promiscuous mode)
MAN IN THE MIDDLE
Advanced Attacks
 Traffic Blocking
 Web page denied – 404 error even though the page
works fine
 Filters
 Listen for any signature and change it
 Break Encryption
 Crypto rollbacks and de-authorization
Similar Attacks
 HostAP can be used to create a rogue access point that
clients will authenticate with, much like ARP poisoning,
but it's more obvious to admin's.
 Other MITM attacks can use HostAP to deauthenticate a
client and force it to re-authenticate with themselves on
a different channel.
Protections
 SSL connections *may* prevent you from connecting
through the MITM.
 Read certificates carefully (https pass through) before
connecting.
 File-Encrypt (Other encrypted files) any file you don't
want intercepted.
 WEP won't work at all because the hacker can tumble your
data and find the Key. With the key, all traffic can be
decrypted on-the-fly, as if it's clear text.
Sniffing
 It is the easiest attack to launch since all the packets
transit through the attacker.
 All the “plain text” protocols are compromised (the
attacker can sniff user and password of many widely used
protocol such as telnet, ftp, http)
Hijacking
 Easy to launch
 It isn’t blind (the attacker knows t blind (the attacker
knows exactly the sequence numbers of the exactly the
sequence numbers of the TCP connection)
Injecting
 Possibility to add packets to an already established
connection (only possible in full-duplex connection (only
possible in full-duplex mitm).
 The attacker can modify the sequence numbers and keep
the connection synchronized while injecting keep packets.
 If the mitm attack is a “proxy attack proxy attack” it is
even it easier to inject (there are two distinct
connections).
Filtering
 The attacker can modify the payload of the packets by
recalculating the checksum.
 He/she can create filters on the fly.
 The length of the payload can also be changed but only in
full-duplex (in this case the seq has to be adjusted).
DNS spoofing
 If the attacker is able to sniff the ID of the DNS request,
 he/she can reply before the real DNS server
HOST DNSserverX.localdomain.in
10.1.1.50
MITM
10.1.1.1
Man in The Middle Attack

More Related Content

PPTX
Man in the middle attack (mitm)
PPTX
Man in the middle
PDF
Luận văn: Khai phá dữ liệu; Phân cụm dữ liệu, HAY
PPTX
Social engineering
PPTX
SEMINAR ON CYBER SECURITY.pptx
PPTX
Ssh (The Secure Shell)
PDF
Primavera - Tutorial
PPTX
DoS or DDoS attack
Man in the middle attack (mitm)
Man in the middle
Luận văn: Khai phá dữ liệu; Phân cụm dữ liệu, HAY
Social engineering
SEMINAR ON CYBER SECURITY.pptx
Ssh (The Secure Shell)
Primavera - Tutorial
DoS or DDoS attack

What's hot (20)

PPT
Diffiehellman
PPTX
Man in the middle attack .pptx
PPT
6. cryptography
PDF
2. public key cryptography and RSA
PPTX
Symmetric and asymmetric key
PPTX
Cryptography.ppt
PPTX
Different types of attacks in internet
ODP
Email security
PPTX
Man In The Middle - Hacking Illustrated
PPTX
RSA Algorithm
PDF
Transposition cipher
PPTX
Public Key Cryptosystem
PPTX
System hacking
 
PPTX
Cryptography.ppt
PPTX
Cryptography and Information Security
PPTX
Cyber threats
PPTX
Cryptography
PPT
Message Authentication Code & HMAC
PPTX
Cryptography
PPTX
Introduction to information security
Diffiehellman
Man in the middle attack .pptx
6. cryptography
2. public key cryptography and RSA
Symmetric and asymmetric key
Cryptography.ppt
Different types of attacks in internet
Email security
Man In The Middle - Hacking Illustrated
RSA Algorithm
Transposition cipher
Public Key Cryptosystem
System hacking
 
Cryptography.ppt
Cryptography and Information Security
Cyber threats
Cryptography
Message Authentication Code & HMAC
Cryptography
Introduction to information security
Ad

Viewers also liked (20)

PDF
ADBMS (MySql) tiny project
PPTX
You Are Born To Blossom by Dr. APJ Abdul Kalam Book Review
ODP
Feb-8-2012-Breaking-Wireless-Security
PPTX
Man in the Middle Attack on Banks
PDF
Online notice board
PPTX
Man In The Middle
PPS
Heart Attack !! Survival Technique -Don’t Ever Think That You Are Not Prone T...
PPTX
Hacking By Nirmal
PDF
Progressive Web Applications
PPT
Owasp presentacion latam tour (Ago 2011)
PPTX
Cómo crear un portal cautivo con easyhotspot
PDF
Man in the middle attacks on IEC 60870-5-104
PDF
PWA e Hybrid App VS Native
PDF
Progressive web apps
PPT
The cat and the bellالقط والجرس
PDF
Introduction to Progressive Web Apps, Google Developer Summit, Seoul - South ...
PDF
Introduction to Progressive web app (PWA)
PPTX
Introduction to security
PPTX
التعرف على الاختراقات في الشبكات المحلية
PDF
Anatomy of a Progressive Web App
ADBMS (MySql) tiny project
You Are Born To Blossom by Dr. APJ Abdul Kalam Book Review
Feb-8-2012-Breaking-Wireless-Security
Man in the Middle Attack on Banks
Online notice board
Man In The Middle
Heart Attack !! Survival Technique -Don’t Ever Think That You Are Not Prone T...
Hacking By Nirmal
Progressive Web Applications
Owasp presentacion latam tour (Ago 2011)
Cómo crear un portal cautivo con easyhotspot
Man in the middle attacks on IEC 60870-5-104
PWA e Hybrid App VS Native
Progressive web apps
The cat and the bellالقط والجرس
Introduction to Progressive Web Apps, Google Developer Summit, Seoul - South ...
Introduction to Progressive web app (PWA)
Introduction to security
التعرف على الاختراقات في الشبكات المحلية
Anatomy of a Progressive Web App
Ad

Similar to Man in The Middle Attack (20)

PPTX
Network Security
DOCX
Network Security
PDF
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
PPTX
Man in-the-middle attack(http)
PPTX
Introduction Ethical hacking by eslam hussein
PDF
Aw36294299
PPTX
cybersecurity
PPT
Hacking 1224807880385377-9
PPTX
It act seminar
PPTX
Man in-the-middle attack(http)
PPT
security issue
PPT
Hack the hack
PDF
The Comprehensive Security Policy In The Trojan War
PPTX
Computer security 7.pptx
PDF
what is transport layer what are the typical attacks in transport l.pdf
PPT
Hacking Presentation
PPTX
Types of attacks in cyber security
PPTX
Wpa2 psk security measure
PDF
Ericas-Security-Plus-Study-Guide
PPTX
Introduction to Network Security
Network Security
Network Security
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Man in-the-middle attack(http)
Introduction Ethical hacking by eslam hussein
Aw36294299
cybersecurity
Hacking 1224807880385377-9
It act seminar
Man in-the-middle attack(http)
security issue
Hack the hack
The Comprehensive Security Policy In The Trojan War
Computer security 7.pptx
what is transport layer what are the typical attacks in transport l.pdf
Hacking Presentation
Types of attacks in cyber security
Wpa2 psk security measure
Ericas-Security-Plus-Study-Guide
Introduction to Network Security

More from Deepak Upadhyay (7)

PPTX
Power of positive attitude
PPTX
EFFICIENT DATA EXTRACTION USING ARTIFICIAL INTELLIGENCE
PPTX
Holographic Data Storage
PPTX
Augmented Reality
PPTX
Basic of HTML, CSS(StyleSheet), JavaScript(js), Bootstrap, JSON & AngularJS
PPTX
Progressive web app
PPTX
Linux fundamentals
Power of positive attitude
EFFICIENT DATA EXTRACTION USING ARTIFICIAL INTELLIGENCE
Holographic Data Storage
Augmented Reality
Basic of HTML, CSS(StyleSheet), JavaScript(js), Bootstrap, JSON & AngularJS
Progressive web app
Linux fundamentals

Recently uploaded (20)

PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Testing WebRTC applications at scale.pdf
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
Digital Literacy And Online Safety on internet
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PPTX
innovation process that make everything different.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Funds Management Learning Material for Beg
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Testing WebRTC applications at scale.pdf
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Slides PDF The World Game (s) Eco Economic Epochs.pdf
international classification of diseases ICD-10 review PPT.pptx
QR Codes Qr codecodecodecodecocodedecodecode
SAP Ariba Sourcing PPT for learning material
Digital Literacy And Online Safety on internet
An introduction to the IFRS (ISSB) Stndards.pdf
Cloud-Scale Log Monitoring _ Datadog.pdf
innovation process that make everything different.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
Unit-1 introduction to cyber security discuss about how to secure a system
Sims 4 Historia para lo sims 4 para jugar
Funds Management Learning Material for Beg
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
presentation_pfe-universite-molay-seltan.pptx
Tenda Login Guide: Access Your Router in 5 Easy Steps
Triggering QUIC, presented by Geoff Huston at IETF 123
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰

Man in The Middle Attack

  • 3. What is MITM ?  A man-in-the-middle (MITM) attack is a form of eavesdropping where communication between two users is monitored and modified by an unauthorized party. Generally, the attacker actively eavesdrops by intercepting a public key message exchange and retransmits the message while replacing the requested key with his own.
  • 4. MITM attack is also known as:  Bucket-brigade attack  Fire brigade attack  Monkey-in-the-middle attack  Session hijacking  TCP hijacking  TCP session hijacking
  • 5. Name Origin:  The name "Man-in-the-Middle" is derived from the basketball scenario where two players intend to pass a ball to each other while one player between them tries to seize it. MITM attacks are sometimes referred to as "bucket brigade attacks" or "fire brigade attacks." Those names are derived from the fire brigade operation of dousing off the fire by passing buckets from one person to another between the water source and the fire.
  • 6. How Does It Work?  Man in the middle is known most to others as "session hijacking" and to general public as "hijacking". These hackers are primarily targeting specific data about the transactions on computers. This can be anything from an email to a bank transaction that said the hackers begin their investigation of the party of interest.
  • 8. What is wireless  More or less it is a radio signal that carries a digital signal. Sender (Router) Receiver
  • 9. Project Description  Configure a wireless network  Perform a Man-in-the-Middle (MITM) attack over a wireless network  MITM is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. (Wikipedia)
  • 10. Log in to The Router Admin  Using IE we connected to the gateway(IP Address:192.168.1.1) and entered the default password
  • 11. WEP Configuration  Changed SSID, changed default username and password to log in and enabled WEP with one key.  Chanel 6 was used instead of 11 because the router was firmware routed to number 6 only.
  • 12. Securing Our Wireless Network  We are then able to see and connect to the network we have configured
  • 13. MAC Filtering Turned on MAC filtering and cloned the known computer and only allowed it
  • 14. MAN IN THE MIDDLE How It Works?  The MitM poisons the ARP cache of the victim and the server/gateway/switch  So the victim computer then thinks the hacker's ARP address is the gateway’s.  The gateway thinks the hacker’s ARP address is the victim computer’s.  All data is redirected through the listening system.
  • 15. MAN IN THE MIDDLE Basic Attacks  Read all clear text information passed between the hosts (i.e., browser requests, username/passwords)  Log/trap all data packets  Packet injection (all these attacks can be performed through traffic dumps and setting your NIC to promiscuous mode)
  • 16. MAN IN THE MIDDLE Advanced Attacks  Traffic Blocking  Web page denied – 404 error even though the page works fine  Filters  Listen for any signature and change it  Break Encryption  Crypto rollbacks and de-authorization
  • 17. Similar Attacks  HostAP can be used to create a rogue access point that clients will authenticate with, much like ARP poisoning, but it's more obvious to admin's.  Other MITM attacks can use HostAP to deauthenticate a client and force it to re-authenticate with themselves on a different channel.
  • 18. Protections  SSL connections *may* prevent you from connecting through the MITM.  Read certificates carefully (https pass through) before connecting.  File-Encrypt (Other encrypted files) any file you don't want intercepted.  WEP won't work at all because the hacker can tumble your data and find the Key. With the key, all traffic can be decrypted on-the-fly, as if it's clear text.
  • 19. Sniffing  It is the easiest attack to launch since all the packets transit through the attacker.  All the “plain text” protocols are compromised (the attacker can sniff user and password of many widely used protocol such as telnet, ftp, http)
  • 20. Hijacking  Easy to launch  It isn’t blind (the attacker knows t blind (the attacker knows exactly the sequence numbers of the exactly the sequence numbers of the TCP connection)
  • 21. Injecting  Possibility to add packets to an already established connection (only possible in full-duplex connection (only possible in full-duplex mitm).  The attacker can modify the sequence numbers and keep the connection synchronized while injecting keep packets.  If the mitm attack is a “proxy attack proxy attack” it is even it easier to inject (there are two distinct connections).
  • 22. Filtering  The attacker can modify the payload of the packets by recalculating the checksum.  He/she can create filters on the fly.  The length of the payload can also be changed but only in full-duplex (in this case the seq has to be adjusted).
  • 23. DNS spoofing  If the attacker is able to sniff the ID of the DNS request,  he/she can reply before the real DNS server HOST DNSserverX.localdomain.in 10.1.1.50 MITM 10.1.1.1