Jericho Security | Glossary

Jericho's Cybersecurity Glossary | Man-in-the-middle (MitM) Attack

Written by Jericho Security Team | Sep 28, 2024 5:42:45 PM

Definition:

A Man-in-the-Middle (MITM) attack occurs when an attacker intercepts communication between two parties, secretly altering or eavesdropping on the exchange without their knowledge.

Use Cases:

  • Used by attackers to steal sensitive data like login credentials or credit card information.
  • Employed in phishing attacks to redirect victims to malicious websites while maintaining the appearance of legitimate communication.

Related Terms:

Questions and Answers:

  • How do MITM attacks work?
    Attackers position themselves between two parties, intercepting and possibly altering the communication, often without either party realizing.

  • What are the common methods of executing a MITM attack?
    Methods include DNS spoofing, HTTPS hijacking, and Wi-Fi eavesdropping.

  • How can MITM attacks be prevented?
    MITM attacks can be prevented through the use of strong encryption (like TLS/SSL), secure VPNs, and by verifying the integrity of websites.