Email Techs

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 17 October 2009

Man-In-The-Middle attack (MITM)

Posted on 22:24 by Unknown

Many a times a question would arises in your mind,

What is MITM ?

ok you wouldn't be able to understand it so lets take an example,fig1-w100-h100

An attacker puts up a fake bank website and entices user to that website. User types in his password, and the attacker in turn uses it to access the bank's real website. Done right, the user will never realize that he isn't at the bank's website. Then the attacker either disconnects the user and makes any fraudulent transactions he wants, or passes along the user's banking transactions while making his own transactions at the same time.

 

Here is what the Wikipedia says about MITM :-

In cryptography, the man-in-the-middle attack (often abbreviated MITM), or bucket-brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances (for example, an attacker within reception range of an unencrypted Wi-Fi wireless access point, can insert himself as a man-in-the-middle).

A Man-in-the-middle attack can only be successful when the attacker can impersonate each endpoint to the satisfaction of the other. Most cryptographic protocols include some form of endpoint authentication specifically to prevent MITM attacks. For example, SSL authenticates the server using a mutually trusted certification authority.

 

Main_the_middle

MITM Techniques

Various defenses against MITM attacks use authentication techniques that are based on:

  • Public key infrastructures
  • Stronger mutual authentication

  • Secret keys (high information entropy secrets)

  • Passwords (low information entropy secrets)

  • Other criteria, such as voice recognition or other biometrics

  • Off-the-Record Messaging for instant messaging

  • Off-channel verification

  • Carry-forward verification

The integrity of public keys must generally be assured in some manner, but need not be secret. Passwords and shared secret keys have the additional secrecy requirement. Public keys can be verified by a Certificate Authority, whose public key is distributed through a secure channel (for example, with a web browser or OS installation). Public keys can also be verified by aweb of trust that distributes public keys through a secure channel (for example by face-to-face meetings).

 

See key agreement for a classification of protocols that use various forms of keys and passwords to prevent man-in-the-middle attacks.

MITM Tools For Hacking

  • dsniff - A tool for SSH and SSL MITM attacks monkey6.

  • Cain - A Windows GUI tool which can perform MITM attacks, along with sniffing and ARP poisoning
  • Ettercap - A tool for LAN based MITM attacks
  • Karma - A tool that uses 802.11 Evil Twin attacks to perform MITM attacks
  • AirJack - A tool that demonstrates 802.11 based MITM attacks
  • wsniff - A tool for 802.11 HTTP/HTTPS based MITM attacks
  • an additional card reader and a method to intercept key-presses on an Automated teller machine

 

 

The MITM attack could also be done over an https connection by using the same technique; the only difference consists in the establishment of two independent SSL sessions, one over each TCP connection. The browser sets a SSL connection with the attacker, and the attacker establishes another SSL connection with the web server. In general the browser warns the user that the digital certificate used is not valid, but the user may ignore the warning because he doesn’t understand the threat. In some specific contexts it’s possible that the warning doesn’t appear, as for example, when the Server certificate is compromised by the attacker or when the attacker certificate is signed by a trusted CA and the CN is the same of the original web site.

MITM is not only an attack technique, but is also usually used during the development step of a web application or is still used for Web Vulnerability assessments.

Email ThisBlogThis!Share to XShare to Facebook
Posted in Hacking | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • New iPhone Worm That Attacks Jail Broken iPhones Also
    Well its again the iPhone which have come to the headlines again , But this time the apple is really pissed of with the kind of work the Ha...
  • Ophcrack Guide : Hack Any Password In Windows
    There might be many times you have heard of Ophcrack, now what is actually it well is a popular to crack passwords in windows. Many...
  • ‘New Moon” Fans Beware Of Hackers
    We are Getting Constant Rumors from many places that Hackers are going to target the the fans of the upcoming movie “New Moon” ...
  • Modern Warfare 2 Hacked By Hackers Now Up For Sale
    Looks like our hackers mate out there have now come with some cool shit, Its the New COD : MODERN WARFARE 2 which is the continuation o...
  • Official Indian Army Website –“Safe From Hackers”
    The new website for the Indian army (IA) have been launched and the authorities are saying it is really safe from any Hackers Activity. ...
  • Dear Mozilla, Please “DONT” fix this. [Pic]
    Today only i found this pic on Digg and i thought there should be a “DONT” in it. isn't it ? ..
  • Norton And Kaspersky On Commercial Fight For Security Suit’s 2010
    When there is Cyber crime there are antivirus and after that there is a fight in between them. You all be knowing about the two most pop...
  • Ubisoft Hacked : Fake or Real ?
    Some days ago we got news about Ubisoft being hacked by some hackers and was being believed till yet but after then some news breached out...
  • Peer Block : Safeguard Yourself From Harmful Server’s
    Have you ever heard of a software called Peer Guardian . So do you know what it is actually well here is the guide for you guys. Peer G...
  • 30 Million Facebook, MySpace, and Orkut ID’s Hacked
    Hackers Have crossed the security boundaries of a widget and multi-social networking based company RockYou.com which host many users from s...

Categories

  • Broadband
  • cyberwar
  • Ebooks
  • email
  • Gamers
  • Guides
  • Hacked
  • Hacker The Dude News
  • Hacking
  • Hacking Software
  • keylogger
  • Misc
  • Mobie's
  • News
  • Orkut
  • PHP
  • Pics
  • Pro Hacks
  • Small Hacks
  • Stylize
  • Tools
  • Torrent
  • Tricks
  • Twitter
  • Video's
  • Virus's
  • Weekly Top 10 Internet Tools
  • Windows
  • XSS

Blog Archive

  • ►  2010 (32)
    • ►  March (7)
    • ►  February (3)
    • ►  January (22)
  • ▼  2009 (123)
    • ►  December (34)
    • ►  November (30)
    • ▼  October (24)
      • Full Guide of PHP Operators
      • How to install windows vista [ Funny ]
      • How to make a fake virus in windows easily
      • A snippet in php to know your ip Address
      • Hacking with Sub 7 : Hack Any Computer with Sub 7 ...
      • Remap ‘E’ Key to close Microsoft Word Prank
      • PW Show : Revel passwords behind the Hashes
      • How to Hack any Gmail Account
      • Man-In-The-Middle attack (MITM)
      • Twitter Hack History
      • Logon Warning hack
      • 3 Ways to View hidden files in Vista
      • Basic Batch File Programming
      • 35+ Nokia Cheat Codes
      • How to Rename Recycle Bin
      • Which Linux To Choose
      • Spam your friend !!
      • Check Your Password Strength !!
      • Hacking iPhone
      • Top 10 Internet tools #4
      • µTorrent Hidden Hack
      • Logon Automatically
      • Top 100 Security Tools
      • Hackoft #1
    • ►  September (9)
    • ►  August (6)
    • ►  July (1)
    • ►  June (3)
    • ►  May (16)
Powered by Blogger.

About Me

Unknown
View my complete profile