What is a Man-in-the-Middle Attack?
All of you are stay connected through social media , chat application ,or emails, it's important. Businesses understand their customers need to stay connected places like hotels, coffee shops , restaurants, and airports, hence they are provide free WiFi.
A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website. They are mostly targets the financial applications ,e-commerce and other websites because where login is required .For example, a fake banking website may be used to capture financial login information. The fake site is “in the middle” between the user and the actual bank website.
The goal of an attack is to steal :
- personal information
- login credentials
- account details
- credit card numbers
Types of Man-in-the-Middle Attack
- Email hijacking
- Wi-Fi eavesdropping
- Stealing browser cookies
- SSL hijacking
- DNS spoofing
Email hijacking
It is a one form of Man-in-the-Middle Attack. In this attack they gain access to email accounts without user's permission. Then they listen the communications between victim and other email accounts which are connected to victim. Use this information for their criminal purpose.
Wi-Fi eavesdropping
All of you are stay connected through social media , chat application ,or emails, it's important. Businesses understand their customers need to stay connected places like hotels, coffee shops , restaurants, and airports, hence they are provide free WiFi.
These hotspots can be among the most dangerous online networks. A hacker might be spying on all the data that you send online. It includes all usernames and passwords you enter while connected to that WiFi. And if you make a bank transaction, the hackers will have your banking credentials. It's too easy targets for hackers.
It's allows an attacker to log into a website that is protected with a user's username and password by stealing data in real-time.It's not a virus ,but it is used like spyware. Cookie theft most often occurs when a user accesses trusted sites over an unprotected or public Wi-Fi network.
SSL hijacking
Comments
Post a Comment
If any doubt or Suggestion let me Know