man in the middle attack

20
Man In The Middle Attack NIIT University, Neemrana September 11, 2014 Anshuman Mishra Rahul Jain Abhishek Tibrewala

Upload: abhishek-tibrewala

Post on 19-Jul-2016

20 views

Category:

Documents


4 download

DESCRIPTION

Man in the Middle Attack

TRANSCRIPT

Page 1: Man in the Middle Attack

Man In The Middle Attack

NIIT University, NeemranaSeptember 11, 2014Anshuman Mishra

Rahul JainAbhishek

Tibrewala

Page 2: Man in the Middle Attack

2

Agenda

Introduction

Key Concept

Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:

Tools Used

Types of MITM Attack

Page 3: Man in the Middle Attack

3

Agenda

Introduction

Key Concept

Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:

Tools Used

Types of MITM Attack

Page 4: Man in the Middle Attack

IntroductionA Man-in-the-Middle attack is a type of cyber attack where a malicious actor inserts him/herself into a conversation between two parties, impersonates both parties and gains access to information that the two parties were trying to send to each other. A Man-in-the-Middle Attack allows a malicious actor to intercept, send, and receive data meant for someone else, or not meant to be sent at all, without either outside party knowing until it is too late. Man-in-the-Middle attacks can be abbreviated in many ways including, MITM, MitM, MiM, or MIM.

Page 5: Man in the Middle Attack

5

Agenda

Introduction

Key Concept

Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:

Tools Used

Types of MITM Attack

Page 6: Man in the Middle Attack

Key ConceptMan-in-the-Middle is a type of eavesdropping attack that occurs when a malicious actor inserts himself as a relay/proxy into a communication session between people or systems.

A MITM attack exploits the real time processing of transactions, conversations, or transfer of other data.

A Man-in-the-Middle attack allows an attacker to intercept, send, and receive data never meant to be for them without either outside party knowing until it is too late.

Page 7: Man in the Middle Attack

Example:(1/2)

Page 8: Man in the Middle Attack

Example: Continue…(2/2)

Page 9: Man in the Middle Attack

9

Agenda

Introduction

Key Concept

Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:

Tools Used

Types of MITM Attack

Page 10: Man in the Middle Attack

Interactions Susceptible to MITM AttackFinancial sites – between login and authenticationConnections meant to be secured by public or private keysOther sites that require logins – where there is something to be gained by having access

Page 11: Man in the Middle Attack

11

Agenda

Introduction

Key Concept

Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:

Tools Used

Types of MITM Attack

Page 12: Man in the Middle Attack

Different Attacks in Different Scenarios:

LAN LOCAL TO REMOTE

   

ARP Poisoning ARP Poisoning

DNS Spoofing DNS Spoofing

STP Mangling DHCP Spoofing

Port Stealing ICMP Redirection

  IRDP Spoofing

Route Mangling

REMOTE  

 

DNS Poisoning WIRELESS

Traffic Tunneling  

Route Mangling Access Point Reassociation

   

Page 13: Man in the Middle Attack

13

Agenda

Introduction

Key Concept

Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:

Tools Used

Types of MITM Attack

Page 14: Man in the Middle Attack

Types of MITM AttackInjectionKey ManipulationDowngrade AttackFiltering

Page 15: Man in the Middle Attack

Examples: Key Manipulation

Page 16: Man in the Middle Attack

Examples: Filtering

Page 17: Man in the Middle Attack

Examples: ARP Poisoning

Page 18: Man in the Middle Attack

18

Agenda

Introduction

Key Concept

Interactions Susceptible to MITM Attack Different Attacks in Different Scenarios:

Tools Used

Types of MITM Attack

Page 19: Man in the Middle Attack

Tools UsedCain and AbelWiresharkKali LinuxEttercap

SSL StripVM Ware

USB WI-FI Adapter

Page 20: Man in the Middle Attack

20

Thank you