Browsing All posts tagged under »MITM«

MITM 2: The OSI model (layer 1-2-3)

January 17, 2012


A Man In The Middle (MITM) attack uses the protocol ARP to: impersonate the router used as default gateway from the target computer point of view. impersonate the target computer from the router point of view. Once the impersonification done, the attacker uses the protocol IP to: Forward the communication from the target computer┬áto the […]

Man In The Middle Part 1: Introduction

November 6, 2011


With my flatmates, a friendly war started. A kind of capture the flag, where the flag is posting a comment with a hijacked Facebook session. I first started with my defence and I came up with the obvious that a Man In The Middle (MITM) will be attempt. A MITM is an active eavesdropping attack […]