ITWissen.info - Tech know how online

man-in-the-middle attack (MitM)

Man-in-the-Middle (MItM) is an attack by a third party on the communication channel that two communication partners, Alice and Bob, use for their communication.

The attacker, for which the synonym Mallory stands, attempts to bring the communication channel under his complete control in such a way that the communication partners cannot determine whether they are communicating with each other or with the attacker. The attacker has control over the traffic, can view the exchanged information and manipulate it.

Man-in-the-middle attack

Man-in-the-middle attack

Man-in-the-middle attacks can be successful if a public- key method without signed certificates is used as encryption, as is the case with HTTPS, for example. The only remedy against man-in-the-middle attacks is unique identification of the participants without revealing the identification to the attacker. This includes Dynamic ARP Inspection( DAI), whichchecks the IP addresses and MAC addresses in the ARP protocol and discards ARP data packets with invalid addresses.

Informations:
Englisch: man-in-the-middle attack - MitM
Updated at: 16.02.2018
#Words: 146
Links: attack, third, communication (COM), channel, Alice and Bob
Translations: DE
Sharing:    

All rights reserved DATACOM Buchverlag GmbH © 2024