Man-in-the-Middle Attacks By: Eamon Callahan and Matthew Harris
Many Abbreviations MiM MItM MitM MITM MIM
How It Works Attacker "eavesdrops" on conversation Impersonates both parties, receives and forwards conversation Goal is to gain information without any party knowing
How It Works
Types: Email Hijacking Bad guys gain access to email account Read emails without making changes May eventually send an email changing account number to pay to Often aimed at businesses to steal client info Prevention: KEEP YOUR EMAIL SECURE
Types: DNS Spoofing Technique in which the attacker (Chris) supplies false DNS (Domain Naming System) information to the victim host so that they are sent to a fake website at a different IP address than the one they are searching for.
Types: WiFi Eavesdropping Bad guys set up “Free Wifi” connection and monitor all traffic that goes through it Can grab passwords, user IDs, account numbers, etc Bad guys can use tools like WireShark and simply read packets as they are sent Tools can even reassemble packets into viewable web pages Prevention: DON’T USE UNSECURED WIFI POINTS FOR ANY IMPORTANT LOGIN https://www.wifipineapple.com/
NSA and GSCHQ Impersonation of Google September 2013 it was discovered as part of the latest NSA scandal that the agency (along with British counterpart GSCHQ) had the ability to and employed it to hack a target’s Internet router and covertly redirect targeted Google traffic using a fake security certificate so it could intercept the information in unencrypted format. A program called Flying Pig was used to overcome the increase in use of SSL encryption by email providers. The system appears to allow it to identify information related to use of the anonymity browser Tor (it has the option to query “Tor events”) and also allows spies to collect information about specific SSL encryption certificates.
BlueTooth Vulnerabilites Devices accessed via Bluetooth Android, iOS, Linux, Windows Bluetooth used to propagate malware Ransomware, BotNets, etc. “These silent attacks are invisible to traditional security controls and procedures. Companies don't monitor these types of device-to-device connections in their environment, so they can't see these attacks or stop them” https://www.scmagazineuk.com/billions-of-bluetooth-devices-vulnerable-to-mitm-attacks- no-user-action/article/688067/