Fill in the Blanks Session 04- MitM AttacksOnline version Subject : Security and Privacy Risks in Computer & Internet Applications Lecturer: Assoc. Prof. Dr. James Joshi Faculty: Graduate School of Information Technology Siam University, Bangkok, Thailand by Prince Parham 1 Sniffing router ARP filtering Hijacking mangling traffic ARP injecting sniff 1 . is the easiest attack to launch since all the packets transit through the attacker . All the " plain text " protocols are compromised ( the attacker can user and password of many widely used protocol such as telnet , ftp , http ) 2 . isn't blind ( the attacker knows exactly the sequence numbers of the TCP connection ) . 3 . Within , the attacker can modify the sequence numbers and keep the connection synchronized while injecting packets . 4 . Within , the attacker can modify the payload of the packets by recalculating the checksum . 5 . Within poisoning , the attacker can forge a spoofed ICMP packets to force the host to make an ARP request . Immediately after the ICMP it sends the fake replay . 6 . STP is not a real MITM attack since the attacker is able to receive only " unmanaged " traffic . 7 . Within ICMP redirect , the attacker can forge ICMP redirect packet in order to Redirect to himself . 8 . Within IRDP spoofing , The attacker can forge some advertisement packet pretending to be the for the LAN . He / she can set the " preference level " and the " lifetime " at high values to be sure the hosts will choose it as the preferred router .