This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Man-in-the-middle attack"

From OWASP
Jump to: navigation, search
m (Examples)
m (Examples)
Line 5: Line 5:
  
 
==Examples ==
 
==Examples ==
[[Image:test]]
+
[[Image:MITM.jpg]]
 
Image courtesy of www.arcot.com [http://www.arcot.com/mitm/images/mitm_diagram_lg.gif]
 
Image courtesy of www.arcot.com [http://www.arcot.com/mitm/images/mitm_diagram_lg.gif]
 
<br>
 
<br>

Revision as of 21:36, 29 April 2007

This is an Attack. To view all attacks, please see the Attack Category page.


Description

A Man In The Middle (MITM) attack is a form of attack in which an evil hacker can trick end users in to thinking he is a bank or other such service in order to 'sniff' or steal the users login credentials.

Examples

MITM.jpg Image courtesy of www.arcot.com [1]
In this example you see the attacker intercepting, logging and stealing any information passed to the server.

Related Threats

Related Attacks

SSL man-in-the-middle attack

Related Vulnerabilities

Related Countermeasures

Categories

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.