Man in the Middle Attacks (original) (raw)
| | | OSdata.com | | ------------------------------------------------------------------------------------ | | ---------- |
OSdata.com is used in more than 300 colleges and universities around the world
Find out how to get similar high web traffic and search engine placement.
man-in-the-middle attacks
In a man-in-the-middle attack (or eavesdropping attack), the attacker intercepts network transmissions between two hosts. The attacker then masquerades as one of the hosts, often inserting additional transmissions into the network dialogue.
defense
Encryption is the best defense against man-in-the-middle attacks.
Strong encryption authentication helps prevent man-in-the-middle attacks. For example, using ssh instead of telnet.
Session checksums and shared secrets (such as cookies) are useful defense against man-in-the-middle attacks in web interfaces.
File encryption also helps defend against man-in-the-middle attacks. Utilities such as PGP or Entrust are useful for this purpose.
common attacks
- man in the middle
- race condition
geek humor
OSdata.com is used in more than 300 colleges and universities around the world
A web site on dozens of operating systems simply can’t be maintained by one person. This is a cooperative effort. If you spot an error in fact, grammar, syntax, or spelling, or a broken link, or have additional information, commentary, or constructive criticism, please e-mail Milo. If you have any extra copies of docs, manuals, or other materials that can assist in accuracy and completeness, please send them to Milo, PO Box 1361, Tustin, CA, USA, 92781.
Click here for our privacy policy.
home page
two levels up
one level up
- Cost
- Hardware Supported
- Hardware-Software Integration
- Installation and Set-up
- Utilization of Resources
- Scalability
- Connectivity
- Reliability
- Security
- Failure Handling and Failure Recovery
- Speed
- Sophistication
- Ease of Use
- Maintenance and Administration
- Disabled Access
- Release Dates
- Development and APIs
peer level
This web site handcrafted on Macintosh computers using Tom Bender’s Tex-Edit Plus and served using FreeBSD .
Names and logos of various OSs are trademarks of their respective owners.
Copyright © 2005 Milo
Last Updated: May 8, 2005
Created: May 8, 2005