Welcome to Bucaro TecHelp!

Bucaro TecHelp
HTTPS Encryption not required because no account numbers or
personal information is ever requested or accepted by this site

About Bucaro TecHelp About BTH User Agreement User Agreement Privacy Policy Privacy Site Map Site Map Contact Bucaro TecHelp Contact RSS News Feeds News Feeds

Man in the Middle Attack

Man in the Middle (MIM) attack

In a Man in the Middle (MIM) attack the hacker places eavesdropping equipment between the sending device and the receiving device. He intercepts the data, records it and possibly modifies it, then sends it on to the intended receiving device. The attack is especially successful if neither the sender nor the receiver are aware that their data has been compromised.

In a MIM attack the attacker might insert a fake router into the communication media. The fake router routes packets from the sender's IP address to his eavesdropping equipment. He then records the data and possibly modifies it. Then he routes the packets back to the communication media, making sure the "hop" caused by his fake router is not recorded and the source in the packets is the original senders IP address. The sender and receiver have no knowledge that their data has been intercepted.

The defense against MIM attacks is to use strong data encryption. Strong data encryption requires that the encryption key be verified by a trusted third party called a Certificate Authority (CA).

More Network Security Articles:
• How to Use the Open Source Intrusion Detection System SNORT
• Firewall Internet Security - The Basics of a Firewall
• What is Cross Site Scripting?
• Network Security Model - Defining an Enterprise Security Strategy
• The Basics of Network Security
• The Use of HoneyPots and HoneyNets to Trick Hackers
• Firewall Perimeter Network (DMZ)
• How to Secure Your Small Business Network
• How Snort's Stealth TCP Port Scanning Works
• Wireless Network Security - The Basics of Securing a Wireless LAN

RSS Feed RSS Feed


Follow Stephen Bucaro Follow @Stephen Bucaro


Computer Networking Sections

Fire HD
[Site User Agreement] [Privacy Policy] [Site map] [Search This Site] [Contact Form]
Copyright©2001-2018 Bucaro TecHelp 13771 N Fountain Hills Blvd Suite 114-248 Fountain Hills, AZ 85268