Overview of What is Man In The Middle Attack
We all have been using computers and alike devices on a daily basis for a long time now. And with its constant and ongoing evolution, new techniques are getting built so as to ease the pressure of manually doing a certain task or to make the process work much faster. This all is being possible because of the computers and technology advancements. But as the verse goes, “A coin has two sides”, not everything is very secure and it causes data theft and probably wrong uses of the same. Man In The Middle Attack is of such type.
Man In The Middle Attack
When two users are communicating with each other and another third unknown entity enters into the conversation to eavesdrop so as to attain the data from the conversation. This third unknown entity is totally unknown to the recipient and sender of the communications (users). E.g.: You are chatting with someone online. There’s a third unknown entity present in the communication, which is totally unknown to both of you. This third-person might chat individually with both in a way that both will keep thinking that the other is sending messages. Or the third entity can intercept the messages and add new content to it. This all will be done so discreetly that both the users will remain totally un-notified.
Following diagrams depicts how a MITM happens:
Figure 1: This is the regular route or the channel through which the communication should take place.
Figure 2: The communication is taking place through the altered channel and Man in the Middle has attacked the systems /users.
In simple words, Main in the Middle Attack is the same as the person who eavesdrops in the conversation and uses the information for his / her benefit.
Types of Man in the Middle Attack
Below are the different types of man in the middle attack which are as follows:
4.5 (2,873 ratings)
1. Session Hacks
We often get notifications when we browse about cookies and sessions. So these cookies and sessions store the information which is our personal. It might contain login ids and passwords. So what MITM attackers do is, they get the hold of these session cookies and once they have it, all the sensitive data is accessible to them and then the data theft happens. Generally, all the sites have auto-fill up forms and ask users to enter the passwords and verify, etc, this is where they get people’s data.
2. Email Hacks
MITM attackers access the interception of messages between two users. The first user sends some sensitive information over the net to the second user. So, it works exactly like figure 2. The attacker sends the email to either party, which is masked, that means, either one doesn’t figure it out that it is fake and demands some sensitive information or account details and then the hacking takes place.
3. Wi-Fi Hacks
Generally, this happens when users connect to a free Wi-Fi source and hackers can easily target such users. Free Wi-Fi sources are very crucial mediums of connections, as a very low level of security is made available through it. Another Wi-Fi hack is, the attackers develop a very similar network to what the users are currently working on.
Purpose & Motive of Man in the Middle Attack
Man in the Middle attackers; generally target the users who are naïve with the network controls. Easy targets. But, it doesn’t mean that complex systems cannot be hacked. These attackers gather this information and then use it as a normal user to use it. It is mainly targeted to get sensitive information of/from the users like account details, bank PINs. This information helps them to enter into the system and use it or even sell the information. This has been seen recently many times, that due to the attacker, system data has been published online or sensitive data has been leaked.
How does Man In The Middle take place?
There are two main steps with the help of which MITM attackers hack into the systems; viz:
The attacker makes a dummy network that can be used by users for free. And when the users enter the data, it is first transferred to the attacker’s files and then towards the reallocation. This is the passive and most easy of attacking the systems.
Attackers might use one of the following ways too:-
- IP Spoofing: All the devices have IP addresses. When the user enters the data over a network, it gets transferred to the receivers IP address. But in between, the attackers create some IP addresses which are very similar to the recipient’s IP address. So, instead of sending data to the real destination, it gets transferred to the attacker’s IP address.
- ARP Spoofing: In this, MAC addresses of the attackers are attached along with the IP address of the user. So data gets transferred to the attacker’s IP address as soon as it is sent.
- DNS Spoofing: DNS means Domain Name System. Attackers, change the cache records of the browsers. So when the user enters the given site, instead of going to the correct URL / website, it is sent to some dummy site that has been created by the attacker.
- HTTPS Spoofing: Generally all the users see the “https” as secure. But in this attacker, puts in manually a certificate, which looks like secure and trusted to be used. So, all the data is routed through it. But as it looks similar to a secure site, the browser sends the key to read the data an attacker gains access to the information.
- SSL Beast: Attacker infects the user’s computer with some false cookies and CBC is compromised, so the data is easily decrypted.
- SSL hijacking: As mentioned earlier, HTTPS stands for secure. But, just before the browser connects to the HTTPS from HTTP, it is routed to the attacker’s browser.
- SSL Stripping: Attacker brings down the website security to a level, where all it is in between HTTPS and HTTP. So all the data is available in a non-encrypted textual format.
What to do after Man In The Middle Attack and How to prevent it?
There are certain ways/steps which can be followed to prevent the attack after it has taken place, viz:
- Check the security levels of the networks, to which you are connected with.
- Never connect to the Free Wi-Fi source unless it is from a known source.
- Stay alerted of potentially fraudulent emails and unknown links, which might lead to other unknown websites.
- Stay connected to the websites, which are connected with HTTPS protocols, they have more level of security over HTTP.
- Use VPNs while on a network, so the data which is being used or transferred securely. All the data is fetched and saved using a VPN is encrypted.
- Use anti-malware softwares that detect and eliminate the malware.
While using data on the network, always stay connected to the secure sites and avoids clicking on the links which might lead to some unknown sources.
This has been a guide to What is Man In The Middle Attack. Here we have discuss the overview, Types, Purpose & Motive etc. You can also go through our other suggested articles to learn more –