SlideShare a Scribd company logo
Man-in-the-Middle Attack
(HTTP)
 The man-in-the middle attack intercepts a
communication between two systems.
 For example, in an http transaction the target
is the TCP connection between client and
server.
 The MITM(http) attack is very effective because
of the nature of the http protocol and data
transfer which are all ASCII based.
 There are several tools to realize a MITM
attack(http). These tools are particularly
efficient in LAN network environments.
 tcpdump and wireshark are the tools that can
be used to attack the victims in the network
nodes.
 In this scenario is I am using Wireshark, to
attack the vulnerability in between the network
nods.
 Wireshark is a powerful network protocol
analyzer. It can go to the deepest level of
packet inspection .
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
 CWE-318: Clear text Storage of Sensitive Information in
Executable.
 Summary:
The application stores sensitive information in clear text
in an executable.
Extended Description :
Attackers can reverse engineer binary code to obtain
secret data. This is especially easy when the clear text is
plain ASCII. Even if the information is encoded in a way
that is not human readable, certain techniques could
determine which encoding is being used, then decode the
information.

More Related Content

PPTX
PPT on Phishing
PPTX
Man in The Middle Attack
PPTX
Man in the middle attack (mitm)
PPT
IT Security Awareness-v1.7.ppt
PPTX
Footprinting and reconnaissance
PPTX
Brute force-attack presentation
PPTX
VAPT PRESENTATION full.pptx
PDF
Network Security Presentation
PPT on Phishing
Man in The Middle Attack
Man in the middle attack (mitm)
IT Security Awareness-v1.7.ppt
Footprinting and reconnaissance
Brute force-attack presentation
VAPT PRESENTATION full.pptx
Network Security Presentation

What's hot (20)

PPT
Network Security
PPTX
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PPTX
The CIA triad.pptx
PPTX
Sql injections - with example
PDF
Computer Security Threats
PPTX
Basics of Denial of Service Attacks
PDF
Cyber Security Awareness
PPTX
Ethical hacking : Its methodologies and tools
PPT
Phishing
PPTX
Denial of service
PPTX
PPTX
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
PPSX
Hacking
PDF
Cyber security and demonstration of security tools
PPT
Hacking And Its Prevention
PPTX
PPTX
Social Engineering
PPTX
PPTX
Cybersecurity
Network Security
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
The CIA triad.pptx
Sql injections - with example
Computer Security Threats
Basics of Denial of Service Attacks
Cyber Security Awareness
Ethical hacking : Its methodologies and tools
Phishing
Denial of service
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Hacking
Cyber security and demonstration of security tools
Hacking And Its Prevention
Social Engineering
Cybersecurity
Ad

Viewers also liked (19)

ODP
Man in the middle
PDF
Analyzing Bitcoin Security
PPTX
Arp spoofing slides
PPTX
Cyber attacks and IT security management in 2025
PPT
BotNet Attacks
PPTX
man in the middle
PPTX
Introduction to Bitcoins and Cryptocurrency
PPT
Botnet Detection Techniques
PPTX
Ppt.1
PPTX
Man In The Middle - Hacking Illustrated
PPT
Arp spoofing
PPTX
Bitcoin technology
PPTX
Bitcoin (Global Digital Currency)
PDF
PSFK Presents the Future of Digital Safety & Security
PPTX
Cybercrime.ppt
PPTX
Cyber-crime PPT
PPTX
Cyber security
PDF
Mobile-First SEO - The Marketers Edition #3XEDigital
Man in the middle
Analyzing Bitcoin Security
Arp spoofing slides
Cyber attacks and IT security management in 2025
BotNet Attacks
man in the middle
Introduction to Bitcoins and Cryptocurrency
Botnet Detection Techniques
Ppt.1
Man In The Middle - Hacking Illustrated
Arp spoofing
Bitcoin technology
Bitcoin (Global Digital Currency)
PSFK Presents the Future of Digital Safety & Security
Cybercrime.ppt
Cyber-crime PPT
Cyber security
Mobile-First SEO - The Marketers Edition #3XEDigital
Ad

Similar to Man in-the-middle attack(http) (20)

PPTX
Man in-the-middle attack(http)
PDF
Hiding message from hacker using novel network techniques
PDF
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
PDF
Cryptography and network security.
PDF
G011123539
PDF
Ijarcet vol-2-issue-4-1322-1329
PDF
An Efficient privacy preserving for Mobile and Pervasive Computing
PPTX
Ethical Hacking - sniffing
DOCX
Firewall configuration
PDF
PDF
A network behavior analysis method to detect this writes about a method to ...
PPTX
IOT Network architecture and Design.pptx
PDF
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
PDF
A Survey: DDOS Attack on Internet of Things
PDF
Mastering Networking and Cyber Security A Comprehensive Guide.pdf
PDF
IoT.pdf
PDF
internet architecture.pdf
ODP
Network traceability
PDF
Module 7 (sniffers)
PPTX
Internet of things(iot)
Man in-the-middle attack(http)
Hiding message from hacker using novel network techniques
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Cryptography and network security.
G011123539
Ijarcet vol-2-issue-4-1322-1329
An Efficient privacy preserving for Mobile and Pervasive Computing
Ethical Hacking - sniffing
Firewall configuration
A network behavior analysis method to detect this writes about a method to ...
IOT Network architecture and Design.pptx
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
A Survey: DDOS Attack on Internet of Things
Mastering Networking and Cyber Security A Comprehensive Guide.pdf
IoT.pdf
internet architecture.pdf
Network traceability
Module 7 (sniffers)
Internet of things(iot)

Man in-the-middle attack(http)

  • 2.  The man-in-the middle attack intercepts a communication between two systems.  For example, in an http transaction the target is the TCP connection between client and server.
  • 3.  The MITM(http) attack is very effective because of the nature of the http protocol and data transfer which are all ASCII based.  There are several tools to realize a MITM attack(http). These tools are particularly efficient in LAN network environments.
  • 4.  tcpdump and wireshark are the tools that can be used to attack the victims in the network nodes.  In this scenario is I am using Wireshark, to attack the vulnerability in between the network nods.  Wireshark is a powerful network protocol analyzer. It can go to the deepest level of packet inspection .
  • 15.  CWE-318: Clear text Storage of Sensitive Information in Executable.  Summary: The application stores sensitive information in clear text in an executable. Extended Description : Attackers can reverse engineer binary code to obtain secret data. This is especially easy when the clear text is plain ASCII. Even if the information is encoded in a way that is not human readable, certain techniques could determine which encoding is being used, then decode the information.