Definition:
A Man-in-the-Middle (MITM) attack occurs when an attacker intercepts communication between two parties, secretly altering or eavesdropping on the exchange without their knowledge.
Use Cases:
- Used by attackers to steal sensitive data like login credentials or credit card information.
- Employed in phishing attacks to redirect victims to malicious websites while maintaining the appearance of legitimate communication.
Related Terms:
Questions and Answers:
- How do MITM attacks work?
Attackers position themselves between two parties, intercepting and possibly altering the communication, often without either party realizing.
- What are the common methods of executing a MITM attack?
Methods include DNS spoofing, HTTPS hijacking, and Wi-Fi eavesdropping.
- How can MITM attacks be prevented?
MITM attacks can be prevented through the use of strong encryption (like TLS/SSL), secure VPNs, and by verifying the integrity of websites.