Icon New game New game

Session 05- MitM Attacks II

Fill in the Blanks

Subject : Security and Privacy Risks in Computer & Internet Applications
Lecturer: Assoc. Prof. Dr. James Joshi
Faculty: Graduate School of Information Technology
Siam University, Bangkok, Thailand

Download the paper version to play

Recommended age: 21 years old
0 times made

Created by

Thailand

Top 10 results

There are still no results for this game. Be the first to stay in the ranking! to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Fill in the Blanks

Session 05- MitM Attacks IIOnline version

Subject : Security and Privacy Risks in Computer & Internet Applications Lecturer: Assoc. Prof. Dr. James Joshi Faculty: Graduate School of Information Technology Siam University, Bangkok, Thailand

by Prince Parham
1

eavesdropping relays keys cryptographic authentication intercept Public JavaScript

1 . Based on the " Mitigating a Fallacy " rules :
Executing on victim = = executing an attack

2 . The man - in - the - middle attack ( often abbreviated MitM , also known as a bucket brigade attack , or sometimes Janus attack ) in cryptography and computer security is a form of active in which the attacker makes independent connections with the victims and messages between them , making them believe that they are talking directly to each other over a private connection , when in fact the entire conversation is controlled by the attacker .

3 . The attacker must be able to all messages going between the two victims and inject new ones , which is straightforward in many circumstances ( for example , an attacker within reception range of an unencrypted Wi - Fi wireless access point , can insert himself as a man - in - the - middle ) .

4 . A man - in - the - middle attack can succeed only when the attacker can impersonate each endpoint to the satisfaction of the other ? it is an attack on mutual ( or lack thereof ) . Most protocols include some form of endpoint authentication specifically to prevent MITM attacks . For example , SSL can authenticate one or both parties using a mutually trusted certification authority .

5 . Various defenses against MITM attacks use authentication techniques that are based on the key infrastructures .

6 . Stronger mutual authentication , such as :
Secret ( which are usually high information entropy secrets , and thus more secure ) , or
Passwords ( which are usually low information entropy secrets , and thus less secure ) .

educaplay suscripción