当前位置:网站首页>Mitm (man in the middle attack)

Mitm (man in the middle attack)

2022-06-10 14:56:00 MyFreeIT

TODO wait a moment

Definition

Man-in-the-middle attack ( English :Man-in-the-middle attack, abbreviation :MITM) In the field of cryptography and computer security, it means that the attacker creates independent contact with both ends of the communication , And exchange the data they receive , Make both sides of the communication think they are talking directly to each other through a private connection , But in fact, the whole session is completely controlled by the attacker . In the middle man attack , The attacker can intercept calls from both sides and insert new content . In many cases it's very simple ( for example , In an unencrypted Wi-Fi Man in the middle attacker within the range of wireless access point , You can plug yourself in as a middleman ).

The precondition for a man in the middle attack to succeed is that the attacker can disguise himself as every terminal participating in the session , And not seen through by other terminals . Man in the middle attack is a ( lack ) Mutual authentication attack . Most encryption protocols add some special authentication methods to prevent man in the middle attacks . for example ,SSL The protocol can verify whether the certificate used by one or both parties participating in the communication is issued by an authoritative and trusted digital certificate certification authority , And can perform two-way authentication .

Case study

principle

Solution

原网站

版权声明
本文为[MyFreeIT]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/161/202206101449229447.html