Overview
In a MitM attack, the attacker sits between the victim and a legitimate resource (like a website or server). They can intercept sensitive data, such as login credentials, and even inject malicious content into the communication.
Common Techniques
- ARP Spoofing: Redirecting traffic on a local network.
- DNS Spoofing: Directing users to a fraudulent website.
- Wi-Fi Eavesdropping: Intercepting traffic on unencrypted or rogue Wi-Fi networks.
Prevention
- Encryption (TLS/SSL): Ensuring data is encrypted in transit.
- VPNs: Providing a secure, encrypted tunnel for all traffic.
- Public Key Infrastructure (PKI): Verifying the identity of the parties involved.