man-in-the-middle attack

(redirected from MITM attack)

man-in-the-middle attack

An unauthorized interception of network traffic. The packets are viewed or modified by the perpetrator and sent on to the recipient, who is unaware of the intrusion. A man-in-the-middle attack can be used to intercept an encrypted message exchange and spoof the recipient into thinking the message is intact from a legitimate sender. In such a case, the attackers replace the public key from the original sender with their own public key in order to decrypt the message that will be sent back from the unsuspecting recipient. See replay attack, public key cryptography and ARP cache poisoning.
References in periodicals archive ?
With the help of an SSL certificate, he/she will be able to avoid MITM attack, phishing and other hazardous scams.
When asked what security risks would result from an untrustworthy CA issuing certificates for their browser, application or mobile device, 58% of respondents stated they are concerned about MITM attacks and 14% have concerns about replay attacks.
Given these numbers, McAfee Labs findings suggest that the choice by mobile app developers to not patch the SSL vulnerabilities has potentially put millions of users at risk of becoming targets of MITM attacks.
By reusing the same certificate and keys, the security team says computers are left vulnerable to MITM attacks on networks such as public Wi-Fi.
They provided a comparative analysis of the existing MITM attacks on Bluetooth.
In monitoring MITM attacks occurring across the world in 2013, Renesys observed more than 60 hijacks by November, with about 1,500 individual IP addresses affected across 150 cities.
Using MalloDroid, a tool researchers built to detect potential vulnerability against MITM attacks, they determined that 8% of the apps contain code that could be vulnerable.
They found that 1,074 of the applications "contain SSL specific code that either accepts all certificates or all hostnames for a certificate and thus are potentially vulnerable to MITM attacks," according to a summary posted online .
100% of respondents were aware that integrating Stronger User Authentication, with Fraud Detection, and Risk Based Transaction Authorization is the strongest form of defence against Online Identity Theft, MITM attacks and Financial Frauds.
MITM attacks essentially establish a proxy server between the customer and the actual banking site (usually by way of some combination of e-mail phishing and site spoofing) that then becomes an invisible conduit between the two authenticated parties.
Once the connecting system is exploited, the user can leverage CORE IMPACT's network testing capabilities to reveal and follow attack paths across other systems on the same network - allowing them to not only demonstrate how easily MiTM attacks compromise unsecured WiFi networks and clients, but also how far an attacker could proceed after the initial compromise.