Overview

In a MitM attack, the attacker sits between the victim and a legitimate resource (like a website or server). They can intercept sensitive data, such as login credentials, and even inject malicious content into the communication.

Common Techniques

  • ARP Spoofing: Redirecting traffic on a local network.
  • DNS Spoofing: Directing users to a fraudulent website.
  • Wi-Fi Eavesdropping: Intercepting traffic on unencrypted or rogue Wi-Fi networks.

Prevention

  • Encryption (TLS/SSL): Ensuring data is encrypted in transit.
  • VPNs: Providing a secure, encrypted tunnel for all traffic.
  • Public Key Infrastructure (PKI): Verifying the identity of the parties involved.