Jan 12, 2014

Man in the Middle Attack

There is an example of what might happen once the Man in the Middle has inserted him/herself





The hacker is impersonating the both sides of the conversation to gain access to funds. This example holds true for a conversation with a client and server as well as person to person conversations. In the example above the attacker intercepts a public key and with that can transpose his own credentials to trick the people on either end into believing they are talking to one another securely.

No comments:

Post a Comment