Man in the Middle Attacks (original) (raw)


sponsored by

| OSdata.com: security | | OSdata.com | | ------------------------------------------------------------------------------------ | | ---------- |

OSdata.com is used in more than 300 colleges and universities around the world

Find out how to get similar high web traffic and search engine placement.

man-in-the-middle attacks

In a man-in-the-middle attack (or eavesdropping attack), the attacker intercepts network transmissions between two hosts. The attacker then masquerades as one of the hosts, often inserting additional transmissions into the network dialogue.

defense

Encryption is the best defense against man-in-the-middle attacks.

Strong encryption authentication helps prevent man-in-the-middle attacks. For example, using ssh instead of telnet.

Session checksums and shared secrets (such as cookies) are useful defense against man-in-the-middle attacks in web interfaces.

File encryption also helps defend against man-in-the-middle attacks. Utilities such as PGP or Entrust are useful for this purpose.


common attacks


geek humor

OSdata.com is used in more than 300 colleges and universities around the world

Read details here.


A web site on dozens of operating systems simply can’t be maintained by one person. This is a cooperative effort. If you spot an error in fact, grammar, syntax, or spelling, or a broken link, or have additional information, commentary, or constructive criticism, please e-mail Milo. If you have any extra copies of docs, manuals, or other materials that can assist in accuracy and completeness, please send them to Milo, PO Box 1361, Tustin, CA, USA, 92781.

Click here for our privacy policy.


home page

two levels up

holistic issues

one level up

peer level


Made with Macintosh

This web site handcrafted on Macintosh computers using Tom Bender’s Tex-Edit Plus and served using FreeBSD .

Viewable With Any Browser


Names and logos of various OSs are trademarks of their respective owners.

Copyright © 2005 Milo

Last Updated: May 8, 2005

Created: May 8, 2005