SlideShare a Scribd company logo
By:  Balvinder Singh  &  Priya Nain Unauthorized Access: Man-in-the-Middle Attacks (MITM)
In this type of attack, the attacker attempts to insert himself in the middle of a communication for  purposes  of intercepting  client’s  data and  could  potentially modify them before discarding them or sending  them out to the real destination. The attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to Each other over a private connection, when in fact the entire conversation is Controlled by the attacker.  Man-in-the-middle attacks
Attacker inserting himself in the middle of a communication Server Client Attacker
Name Origin ,   The name "Man-in-the-Middle" is derived from the basketball scenario where two players intend to pass a ball to each other while one player between them tries to seize it. MITM attacks are sometimes referred to as "bucket brigade attacks" or "fire brigade attacks." MITM attack is also known as: Bucket-brigade attack Fire brigade attack Session hijacking TCP hijacking TCP session hijacking Monkey-in-the-middle attack
Man-in-the-middle attacks take two common forms   Eavesdropping ,  is an attacker simply listens to a set of transmissions to And from different hosts even though the attacker's computer isn't party to the transaction. Many relate this type of attack to a leak, in which sensitive information could be disclosed to a third party without the legitimate users Knowledge. Manipulation,  attacks build on the capability of eavesdropping by taking This unauthorized receipt of a data stream and changing its contents to suit a certain purpose of the attacker-perhaps spoofing an IP address, changing a MAC address to emulate another host, or some other type of modification.
Security Breach Example To ensure no prosecution, hackers contacted bank president and  gave two options: 2003 group of hackers were "testing" security of various banks  and noticed that one was extremely vulnerable Within a couple of hours, they transferred over $10 million  dollars from the bank to a private account Due to bank's poor network security, attackers tracks were difficult to find Sign proposal indicating that hacker's were forming a security assessment at bank's request for $5 million dollars and hackers would then return the other $5 million. Bank could prosecute, but attackers would deny everything and notify  media on bank's poor security
What choice do you think the bank president choose? Bank Manager made a signed aggrement And gave $5 Millions to Hackers on the behalf of security assesment
Man in the Middle Scenario All laptop users connect to a public network Wireless connection can easily be compromised or impersonated Wired connections might also be compromised Internet
Rules of Thumb – Don’ts … Someone might be listening to the requests Don’t browse sensitive sites Don’t supply sensitive information Someone might be altering the responses Don’t trust any information given on web sites Don’t execute downloaded code
Rules of Thumb – What Can You Do? This leaves us with: Browse Non-Sensitive sites Share personal information only over secure networks Non-sensitive sites Boring Sensitive sites Interesting Internet
Passive Man in the Middle Attacks Victim browses to a website Attacker views the request and forwards to server Attacker views the response and forwards to victim Server returns a response  Other servers are not affected
Active Man in the Middle Attack The attacker actively directs the victim to an “interesting” site The IFrame could be invisible Victim browses to a “boring” site Attack transfers the request to the server Attacker adds an IFRAME referencing an “interesting” site Server returns a response  Automatic request sent to the interesting server Other servers are not affected My Weather Channel My Bank Site My Bank Site
 
Secure Connections Login Mechanism
Session Fixation Cookie is being saved on victim’s computer Attacker redirects victim to the site of interest Attacker returns a page with a cookie generated by server A while later, victim connects to the site (with the pre-provided cookie) Attacker uses the same cookie to connect to the server Server authenticates attacker as victim Result Now server authenticate attacker as victim/client, now attacker has same privileges as our victim have.
Attack strategy – Spoofing  Spoofing  is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through The Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source.  An example from cryptography is the Man in the middle Attack, in which an attacker spoofs Alice into believing the attacker is Bob, and spoofs Bob into believing the attacker is Alice, thus gaining access to all messages in both directions without the trouble of Any cryptanalytic effort.
E-Mail address Spoofing  Types of Spoofing URL Spoofing and Phishing Referrer Spoofing
URL spoofing and phishing , Another kind of spoofing is "webpage spoofing” also known as Phishing. In this attack, a legitimate web page such as a bank's site is reproduced in "look and feel" on another server under control of the attacker. The main intent is to fool the users into thinking that they are connected to a trusted site, for instance to harvest usernames and passwords. Referrer spoofing , Some websites, especially pay sites, allow access to their materials only from certain approved (login-) pages. This is enforced by checking the referrer header of the HTTP request.
The sender information shown in E-Mails (the "From" field) can be spoofed easily. This technique is commonly used by spammers to hide the origin of their e-mails and leads to problems such as misdirected Bounces. Like attacker send a message to user by changing its ‘From' field and user Think that message is received by an trusted person and he may reply to that Message and our data may be misused.  E-mail address spoofing
Defending against Spoofing   Spoofing is difficult to defend against due to the attacks being mostly passive by nature.  What you get is a webpage that is different than what you are expecting.  In very targeted attacks it is very possible that you may never know that attackers have been entered into your system By using virtual proxy generator By using login mechanism
?
Thank You

More Related Content

PPTX
Man in the middle
PPT
SSL MITM Attack Over Wireless
PPTX
Man in-the-middle attack(http)
PPTX
Man in-the-middle attack(http)
PPTX
Man in the middle attack (mitm)
PPTX
Man in The Middle Attack
PPTX
Man In The Middle - Hacking Illustrated
PPTX
Web spoofing hacking
Man in the middle
SSL MITM Attack Over Wireless
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in the middle attack (mitm)
Man in The Middle Attack
Man In The Middle - Hacking Illustrated
Web spoofing hacking

What's hot (17)

PDF
Module 10 (session hijacking)
PDF
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
PPT
Module 6 Session Hijacking
PDF
Enhancement in network security with security
PDF
Enhancement in network security with security protocols
PDF
Types of Cryptosystem and Cryptographic Attack
PPT
IS Security Presentation
PPTX
Session Hijacking ppt
PPT
Web spoofing
PDF
Authentication in Smart Grid
PPT
ip spoofing
PPTX
PPTX
network attacks
PPTX
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
PDF
Session hijacking by rahul tyagi
DOCX
Breaking ssl
PDF
Mattias eriksson
Module 10 (session hijacking)
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Module 6 Session Hijacking
Enhancement in network security with security
Enhancement in network security with security protocols
Types of Cryptosystem and Cryptographic Attack
IS Security Presentation
Session Hijacking ppt
Web spoofing
Authentication in Smart Grid
ip spoofing
network attacks
Spoofing attack: Learn about Email spoofing, IP address spoofing and many other
Session hijacking by rahul tyagi
Breaking ssl
Mattias eriksson
Ad

Viewers also liked (20)

PPTX
Al Live: Filtering: The Man in the Middle
PDF
Man in the Middle? - Nein, danke!
PDF
Man in the Middle? - No, thank you!
PDF
Attack modeling vs threat modelling
PPTX
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
PPTX
Lan internetworking devices
PPT
Troubleshooting basic networks
PPTX
Types of VPN
PPTX
Vulnerability Assessment
PPTX
Network sniffers & injection tools
PPT
Computer Networking: Subnetting and IP Addressing
PPT
Basic Network Concepts
PPTX
Sql injection
PDF
Hoover.2016 Texas Bankers CFO Conference
PPTX
Http Vs Https .
PDF
IP Addressing and Subnetting
PPT
CCNA Advanced Routing Protocols
PPTX
VPN, Its Types,VPN Protocols,Configuration and Benefits
PPT
CCNA Routing Protocols
Al Live: Filtering: The Man in the Middle
Man in the Middle? - Nein, danke!
Man in the Middle? - No, thank you!
Attack modeling vs threat modelling
Content Type Attack Dark Hole in the Secure Environment by Raman Gupta
Lan internetworking devices
Troubleshooting basic networks
Types of VPN
Vulnerability Assessment
Network sniffers & injection tools
Computer Networking: Subnetting and IP Addressing
Basic Network Concepts
Sql injection
Hoover.2016 Texas Bankers CFO Conference
Http Vs Https .
IP Addressing and Subnetting
CCNA Advanced Routing Protocols
VPN, Its Types,VPN Protocols,Configuration and Benefits
CCNA Routing Protocols
Ad

Similar to Unauthorized access, Men in the Middle (MITM) (20)

DOCX
Network Security
PPT
Web spoofing (1)
PPTX
Different types of attacks in internet
PPTX
Computer hacking
PPTX
Man in the middle attack .pptx
PPTX
Access Controls Attacks
PPTX
Webspoofing
PPTX
Using OTP prevent Phishing attacks
PPTX
Introduction_of_Cyberthreated_Presentation.pptx
PPS
Amazon & E Bay
PPSX
Shiv seminar final
PPTX
Advance Web Vulnerabilities Chapter 3 to 5
PPT
Phishing: Swiming with the sharks
PPTX
PPT on Phishing
PPT
Spoofing
PDF
Phishing: Analysis and Countermeasures
PPTX
PPT FOR CYBER SECURITY AND FORENSICS MICRO PROJECT
PDF
Ch 1 intro to cyber crime and cyber security.pdf
PDF
Ransomware
PPT
Exploring And Investigating New Dimensions In Phishing
Network Security
Web spoofing (1)
Different types of attacks in internet
Computer hacking
Man in the middle attack .pptx
Access Controls Attacks
Webspoofing
Using OTP prevent Phishing attacks
Introduction_of_Cyberthreated_Presentation.pptx
Amazon & E Bay
Shiv seminar final
Advance Web Vulnerabilities Chapter 3 to 5
Phishing: Swiming with the sharks
PPT on Phishing
Spoofing
Phishing: Analysis and Countermeasures
PPT FOR CYBER SECURITY AND FORENSICS MICRO PROJECT
Ch 1 intro to cyber crime and cyber security.pdf
Ransomware
Exploring And Investigating New Dimensions In Phishing

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
PPTX
The various Industrial Revolutions .pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Hybrid model detection and classification of lung cancer
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
August Patch Tuesday
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
cloud_computing_Infrastucture_as_cloud_p
Modernising the Digital Integration Hub
O2C Customer Invoices to Receipt V15A.pptx
What is a Computer? Input Devices /output devices
Enhancing emotion recognition model for a student engagement use case through...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Programs and apps: productivity, graphics, security and other tools
2021 HotChips TSMC Packaging Technologies for Chiplets and 3D_0819 publish_pu...
The various Industrial Revolutions .pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Getting started with AI Agents and Multi-Agent Systems
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Hybrid model detection and classification of lung cancer
OMC Textile Division Presentation 2021.pptx
Group 1 Presentation -Planning and Decision Making .pptx
August Patch Tuesday
Hindi spoken digit analysis for native and non-native speakers
cloud_computing_Infrastucture_as_cloud_p

Unauthorized access, Men in the Middle (MITM)

  • 1. By: Balvinder Singh & Priya Nain Unauthorized Access: Man-in-the-Middle Attacks (MITM)
  • 2. In this type of attack, the attacker attempts to insert himself in the middle of a communication for purposes of intercepting client’s data and could potentially modify them before discarding them or sending them out to the real destination. The attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to Each other over a private connection, when in fact the entire conversation is Controlled by the attacker. Man-in-the-middle attacks
  • 3. Attacker inserting himself in the middle of a communication Server Client Attacker
  • 4. Name Origin , The name "Man-in-the-Middle" is derived from the basketball scenario where two players intend to pass a ball to each other while one player between them tries to seize it. MITM attacks are sometimes referred to as "bucket brigade attacks" or "fire brigade attacks." MITM attack is also known as: Bucket-brigade attack Fire brigade attack Session hijacking TCP hijacking TCP session hijacking Monkey-in-the-middle attack
  • 5. Man-in-the-middle attacks take two common forms Eavesdropping , is an attacker simply listens to a set of transmissions to And from different hosts even though the attacker's computer isn't party to the transaction. Many relate this type of attack to a leak, in which sensitive information could be disclosed to a third party without the legitimate users Knowledge. Manipulation, attacks build on the capability of eavesdropping by taking This unauthorized receipt of a data stream and changing its contents to suit a certain purpose of the attacker-perhaps spoofing an IP address, changing a MAC address to emulate another host, or some other type of modification.
  • 6. Security Breach Example To ensure no prosecution, hackers contacted bank president and gave two options: 2003 group of hackers were "testing" security of various banks and noticed that one was extremely vulnerable Within a couple of hours, they transferred over $10 million dollars from the bank to a private account Due to bank's poor network security, attackers tracks were difficult to find Sign proposal indicating that hacker's were forming a security assessment at bank's request for $5 million dollars and hackers would then return the other $5 million. Bank could prosecute, but attackers would deny everything and notify media on bank's poor security
  • 7. What choice do you think the bank president choose? Bank Manager made a signed aggrement And gave $5 Millions to Hackers on the behalf of security assesment
  • 8. Man in the Middle Scenario All laptop users connect to a public network Wireless connection can easily be compromised or impersonated Wired connections might also be compromised Internet
  • 9. Rules of Thumb – Don’ts … Someone might be listening to the requests Don’t browse sensitive sites Don’t supply sensitive information Someone might be altering the responses Don’t trust any information given on web sites Don’t execute downloaded code
  • 10. Rules of Thumb – What Can You Do? This leaves us with: Browse Non-Sensitive sites Share personal information only over secure networks Non-sensitive sites Boring Sensitive sites Interesting Internet
  • 11. Passive Man in the Middle Attacks Victim browses to a website Attacker views the request and forwards to server Attacker views the response and forwards to victim Server returns a response Other servers are not affected
  • 12. Active Man in the Middle Attack The attacker actively directs the victim to an “interesting” site The IFrame could be invisible Victim browses to a “boring” site Attack transfers the request to the server Attacker adds an IFRAME referencing an “interesting” site Server returns a response Automatic request sent to the interesting server Other servers are not affected My Weather Channel My Bank Site My Bank Site
  • 13.  
  • 15. Session Fixation Cookie is being saved on victim’s computer Attacker redirects victim to the site of interest Attacker returns a page with a cookie generated by server A while later, victim connects to the site (with the pre-provided cookie) Attacker uses the same cookie to connect to the server Server authenticates attacker as victim Result Now server authenticate attacker as victim/client, now attacker has same privileges as our victim have.
  • 16. Attack strategy – Spoofing Spoofing  is the creation of TCP/IP packets using somebody else's IP address. Routers use the "destination IP" address in order to forward packets through The Internet, but ignore the "source IP" address. That address is only used by the destination machine when it responds back to the source. An example from cryptography is the Man in the middle Attack, in which an attacker spoofs Alice into believing the attacker is Bob, and spoofs Bob into believing the attacker is Alice, thus gaining access to all messages in both directions without the trouble of Any cryptanalytic effort.
  • 17. E-Mail address Spoofing Types of Spoofing URL Spoofing and Phishing Referrer Spoofing
  • 18. URL spoofing and phishing , Another kind of spoofing is "webpage spoofing” also known as Phishing. In this attack, a legitimate web page such as a bank's site is reproduced in "look and feel" on another server under control of the attacker. The main intent is to fool the users into thinking that they are connected to a trusted site, for instance to harvest usernames and passwords. Referrer spoofing , Some websites, especially pay sites, allow access to their materials only from certain approved (login-) pages. This is enforced by checking the referrer header of the HTTP request.
  • 19. The sender information shown in E-Mails (the "From" field) can be spoofed easily. This technique is commonly used by spammers to hide the origin of their e-mails and leads to problems such as misdirected Bounces. Like attacker send a message to user by changing its ‘From' field and user Think that message is received by an trusted person and he may reply to that Message and our data may be misused. E-mail address spoofing
  • 20. Defending against Spoofing Spoofing is difficult to defend against due to the attacks being mostly passive by nature. What you get is a webpage that is different than what you are expecting. In very targeted attacks it is very possible that you may never know that attackers have been entered into your system By using virtual proxy generator By using login mechanism
  • 21. ?