From the course: Ethical Hacking: Session Hijacking

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Intercepting sessions through man-in-the-middle

Intercepting sessions through man-in-the-middle - Linux Tutorial

From the course: Ethical Hacking: Session Hijacking

Start my 1-month free trial

Intercepting sessions through man-in-the-middle

- [Instructor] Electronic commerce involves two people or organizations doing business through messages sent over an internet connection. The expectation is that nobody is listening to the traffic on that connection. And often cryptography will be used to make sure that anyone who does listen won't be able to understand the messages. A man in the middle attack, abbreviated to MITM, is a form of cyber-attack in which the attacker inserts himself or herself into the connection, routing traffic from each of the participants to the other and reading it as it passes through. The attacker can also remove, change, and insert data into the traffic. In the more sophisticated attacks, the attacker is able to defeat any encryption that might be used. Man in the middle, then, is an eavesdropping attack carried about by establishing a relay or proxy into a communications session. It may exploit in real time or after the fact the information obtained from the interception. Often, neither of the…

Contents