Question

In: Computer Science

provide step by step explanation of Man in the Middle attack. Please be very specific (What...

provide step by step explanation of Man in the Middle attack. Please be very specific (What is shared, what is sent etc).

Solutions

Expert Solution

A MITM attack happens when a communication between two systems is intercepted by an outside entity. This can happen in any form of online communication, such as email, social media, web surfing, etc. Not only are they trying to eavesdrop on your private conversations, they can also target all the information inside your devices.

Taking away all the technicalities, the concept of an MITM attack can be described in a simple scenario. Imagine being brought back to the days of old when snail mail was rife. Jerry writes a letter to Jackie expressing his love for her after years of hiding his feelings. He sends the letter to the post office and it’s picked up by a nosy mailman. He opened it and, just for the hell of it, he decided to rewrite the letter before delivering the mail to Jackie. This results in Jackie hating Jerry for the rest of her life after “Jerry” called her a fat cow. The moral of the story is the mailman is a jerk, and so are hackers.

A more modern example would be a hacker sitting between you (and your browser) and the website you’re visiting to intercept and capture any data you submit to the site, such as login credentials or financial information.

A man-in-the-middle attack requires three players. There’s the victim, the entity with which the victim is trying to communicate, and the “man in the middle,” who’s intercepting the victim’s communications. Critical to the scenario is that the victim isn’t aware of the man in the middle.

How does a man-in-the-middle attack work?

How does this play out? Let’s say you received an email that appeared to be from your bank, asking you to log in to your account to confirm your contact information. You click on a link in the email and are taken to what appears to be your bank’s website, where you log in and perform the requested task.

In such a scenario, the man in the middle (MITM) sent you the email, making it appear to be legitimate. (This attack also involves phishing, getting you to click on the email appearing to come from your bank.) He also created a website that looks just like your bank’s website, so you wouldn’t hesitate to enter your login credentials after clicking the link in the email. But when you do that, you’re not logging into your bank account, you’re handing over your credentials to the attacker.


Related Solutions

1. Provide a scenario depicting a man-in-the-middle attack. 2. What will always be the weakest link...
1. Provide a scenario depicting a man-in-the-middle attack. 2. What will always be the weakest link in any security implementation? Why? 3. Define the method and purpose of social engineering.
Explain the differences between a replay attack and a Man-in-the-middle attack.
Explain the differences between a replay attack and a Man-in-the-middle attack.
How would you use a man-in-the-middle attack to capture a password? Provide a detailed description.
How would you use a man-in-the-middle attack to capture a password? Provide a detailed description.
Man-in-the-middle is one of the most popular types of attack. It can be used to sniff...
Man-in-the-middle is one of the most popular types of attack. It can be used to sniff victims credentials to penetrate their system. Research the following attacks to find methods to prevent this from happening: MAC spoofing DNS poisoning DNS spoofing ICMP redirect
Show with a diagram or algorithm a man-in-the-middle attack on the Simple Secret Key Distribution Protocol.
Show with a diagram or algorithm a man-in-the-middle attack on the Simple Secret Key Distribution Protocol.
(Please answer this question in an excel format if possible.) Please provide very detailed explanation and...
(Please answer this question in an excel format if possible.) Please provide very detailed explanation and answers if possible. The Poster Bed Company believes that its industry can best be classified as monopolistically competitive. An analysis of the demand for its canopy bed has resulted in the following estimated demand function for the bed: P ¼ 1760 12Q The cost analysis department has estimated the total cost function for the poster bed as TC ¼ 1 3 Q3 15Q2 þ...
Please provide complete step-by-step explanation. Thanks! Jack and Jill are in the highest marginal tax bracket...
Please provide complete step-by-step explanation. Thanks! Jack and Jill are in the highest marginal tax bracket in Ontario and have maxed-out both their TFSA and RRSP. They have no more room in either tax-shelters and are in the 54% marginal tax rate on ordinary income and interest income and 27% on all realized capital gains. Now, assume Jack decides to invest $100,000 in a stock based mutual fund that earns a constant 5% pre-tax, but the fund is highly inefficient...
INTERNET OF THINGS (IOT) 28. Hackers have employed ‘Man in the Middle Attack (MITM)’ on your...
INTERNET OF THINGS (IOT) 28. Hackers have employed ‘Man in the Middle Attack (MITM)’ on your IT infrastrucutre. How would you explain (with a suitable diagram) this type of attack to your apprentice who has just started working for you?
PLEASE BE VERY SPECIFIC WITH EACH STEP A soft drink bottler is analyzing the vending machine...
PLEASE BE VERY SPECIFIC WITH EACH STEP A soft drink bottler is analyzing the vending machine service routes in his distribution system. He is interested in predicting the amount of time required by the route driver to service the vending machines in an outlet. The industrial engineer responsible for the study has suggested that the two most important variables affecting the delivery time (Y) are the number of cases of product stocked (X1) and the distance walked by the route...
Problem 4 | A modied man-in-the-middle attack on Diffie-Hellman Suppose Alice and Bob wish to generate...
Problem 4 | A modied man-in-the-middle attack on Diffie-Hellman Suppose Alice and Bob wish to generate a shared cryptographic key using the Diffie-Hellman protocol. As usual, they agree on a large prime p and a primitive root g of p. Suppose also that p = mq + 1 where q is prime and m is very small (so p - 1 = mq has a large prime factor, as is generally required). Since g and p are public, it is...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT