Network Security Visibility and Flow Analysis
Network Security Visibility_hb_final.pdf
A man in the middle attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting his own public key for the requested one, so that the two original parties still appear to be communicating with each other.
The attack gets its name from the ball game where two people try to throw a ball directly to each other while one person in between them attempts to catch it. In a man in the middle attack, the intruder uses a program that appears to be the server to the client and appears to be the client to the server. The attack may be used simply to gain access to the message, or enable the attacker to modify the message before retransmitting it.
Man in the middle attacks are sometimes known as fire brigade attacks. The term derives from the bucket brigade method of putting out a fire by handing buckets of water from one person to another between a water source and the fire.
'개발 > 해킹' 카테고리의 다른 글
Cloudflare doesn’t help your DDOS (0) | 2016.05.31 |
---|---|
Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks (0) | 2015.02.03 |
MITM (man in the middle attack) (0) | 2015.02.03 |
Geno 악성코드 (0) | 2013.09.30 |
MS Internet Explorer8 원격코드 실행 취약점 (0) | 2013.09.30 |