Diagram 3 - Man In The Middle Attack

 

(Author's Work)



The steps included primary ideas behind Man In The Middle Attack (MITM) are, to block traffic, break the validation chain, and impersonate the hacked endpoints consistently. The principle objective is to steal the session, and consequently the data being sent over the wire. This handshake builds up a connection between two distinctive network interface cards, which at that point use the bundle sequencing and information affirmations to send or get data. The information flows from the physical layer all the way up to the application layer.  At layer-2 and layer-3, an Ethernet and IP parcel datagram are framed, though at the show layer the cryptographic SSL session is established assuming that the application is intending to utilize it. It is imperative to note here, that every one of these layers can possibly take part in the MITM attack (VALENCYNETWORKS,2019).






Reference:

VALENCYNETWORKS (2019) Cyber Attacks Explained Man In The Middle Attack. [Online] VALENCYNETWORKS. Available from: Cyber Security : Man In The Middle Attack Explained | Pune Mumbai Hyderabad Delhi Bangalore India | Valency Networks [Accessed 06/06/21].

0 Comments