man-in-the-middle attack

(redirected from Mitm)
Also found in: Acronyms.

man-in-the-middle attack

An unauthorized interception of network traffic. The packets are viewed or modified by the perpetrator and sent on to the recipient, who is unaware of the intrusion. A man-in-the-middle attack can be used to intercept an encrypted message exchange and spoof the recipient into thinking the message is intact from a legitimate sender. In such a case, the attackers replace the public key from the original sender with their own public key in order to decrypt the message that will be sent back from the unsuspecting recipient. See replay attack, public key cryptography and ARP cache poisoning.
References in periodicals archive ?
The MITM bug has been present throughout OpenSSL's history,
An MITM scheme's geography may be intricate, but its execution is literally grabbing chunks of random, unencrypted data ("Whatever is being transmitted" from a location at that time, according to Cowie) and snooping through it to find something interesting for hackers to use.
The first of which is the Executive World, where they need to be able to connect security to the business by practicing the soft art of Influence Without Power when speaking to a new audience in terms of critical business functions, of how security risks translate into business risks, of profit/loss considerations, and EBITDA--and if you know what the abbreviation means, then you are most likely already an MitM CISO.
The cumulative install base of the apps with confirmed vulnerabilities against MITM attacks lies between 39.
Malaysia Airlines Regional Senior Vice President for Malaysia/ASEAN, Encik Muzammil Mohamad said, Although we commenced our promotions from 22 October, we have also been offering these attractions from 26 October 2012 at the MITM Travel Fair in the Kuala Lumpur Mid Valley Megal Mall through participating travel agents.
As EntryProtect provides true end-to-end encryption of all transmitted data (beyond the scope of SSL), it also provides full protection against MITM and replay attacks.
It is a one stop source for information worldwide about MITM artists and their performances, as well as special MITM events.
New wireless MiTM testing capabilities in CORE IMPACT Pro v11 allow organizations to test their resiliency in several ways, notably by empowering testers to establish an imposter wireless access point and then launch tests against any systems that subsequently connect.
Interviews with Drolsbaugh can be found on ASL Radio Video, ASL Radio(via interpreter) and on MITM YouTube.
FireID's Transaction Verification application provides a powerful out-of-band authentication solution to secure payments and transactions, entirely thwarting MITM and MITB attacks," said Jenny Dugmore, CEO of FireID.
Transaction Authentication - Dealing with MitB and MitM Threats II-23
These flaws can be exploited by any attacker who has fraudulently obtained a domain validated SSL certificate for a website to launch MITM attacks against the website, even if it is secured with an EV SSL certificate.