Icon New game New game

Session 04- MitM Attacks

Fill in the Blanks

Subject : Security and Privacy Risks in Computer & Internet Applications
Lecturer: Assoc. Prof. Dr. James Joshi
Faculty: Graduate School of Information Technology
Siam University, Bangkok, Thailand

Download the paper version to play

Recommended age: 21 years old
0 times made

Created by

Thailand

Top 10 results

There are still no results for this game. Be the first to stay in the ranking! to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Fill in the Blanks

Session 04- MitM AttacksOnline version

Subject : Security and Privacy Risks in Computer & Internet Applications Lecturer: Assoc. Prof. Dr. James Joshi Faculty: Graduate School of Information Technology Siam University, Bangkok, Thailand

by Prince Parham
1

Sniffing router ARP filtering Hijacking mangling traffic ARP injecting sniff

1 . is the easiest attack to launch since all the packets transit through the attacker . All the " plain text " protocols are compromised ( the attacker can user and password of many widely used protocol such as telnet , ftp , http )

2 . isn't blind ( the attacker knows exactly the sequence numbers of the TCP connection ) .

3 . Within , the attacker can modify the sequence numbers and keep the connection synchronized while injecting packets .

4 . Within , the attacker can modify the payload of the packets by recalculating the checksum .

5 . Within poisoning , the attacker can forge a spoofed ICMP packets to force the host to make an ARP request . Immediately after the ICMP it sends the fake replay .

6 . STP is not a real MITM attack since the attacker is able to receive only " unmanaged " traffic .

7 . Within ICMP redirect , the attacker can forge ICMP redirect packet in order to Redirect to himself .

8 . Within IRDP spoofing , The attacker can forge some advertisement packet pretending to be the for the LAN . He / she can set the " preference level " and the " lifetime " at high values to be sure the hosts will choose it as the preferred router .

educaplay suscripción