paint-brush
What is a  Man In The Middle Attack? Eavesdropping at its best.by@heller_9
844 reads
844 reads

What is a  Man In The Middle Attack? Eavesdropping at its best.

by Hruday Charan4mSeptember 12th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

MitM attacks are the type of attacks where the attacker eavesdrop between two communicating hosts by putting himself in between the point of data transmission. This allows the attacker to “Listen” to what the hosts are communicating and “Read” them. MitM is performed to steal credit card information, login credentials, data manipulation, Identity theft and so on and so forth. Most of this attack is performed in Open WiFi Hotspots in Bus stations, Railway stations or maybe at the nearest Starbucks.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - What is a  Man In The Middle Attack? Eavesdropping at its best.
Hruday Charan HackerNoon profile picture
Hruday Charan

Hruday Charan

@heller_9

A versatile and motivated professional with an ardent interest in Cyber Security and Music Product

About @heller_9
LEARN MORE ABOUT @HELLER_9'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Hruday Charan HackerNoon profile picture
Hruday Charan@heller_9
A versatile and motivated professional with an ardent interest in Cyber Security and Music Product

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here