What is a  Man In The Middle Attack? Eavesdropping at its best.by@heller_9
831 reads

What is a  Man In The Middle Attack? Eavesdropping at its best.

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

MitM attacks are the type of attacks where the attacker eavesdrop between two communicating hosts by putting himself in between the point of data transmission. This allows the attacker to “Listen” to what the hosts are communicating and “Read” them. MitM is performed to steal credit card information, login credentials, data manipulation, Identity theft and so on and so forth. Most of this attack is performed in Open WiFi Hotspots in Bus stations, Railway stations or maybe at the nearest Starbucks.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - What is a  Man In The Middle Attack? Eavesdropping at its best.
Hruday Charan HackerNoon profile picture

@heller_9

Hruday Charan

A versatile and motivated professional with an ardent interest in Cyber Security and Music Product


Receive Stories from @heller_9

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!