Friday, October 4, 2019

Man in the middle and secrity in multichannel Essay

Man in the middle and secrity in multichannel - Essay Example Hence, the attacker makes two systems believe that they are communicating to one another while the attacker controls and modifies the communicated messages. The attacker achieves this by splitting the original TCP connection into two new connections and acting as a proxy where it can read, insert, and modify the data in the intercepted communication. The man in the middle is unauthorized and attacks in real time. The attack can occur in two ways. It can occur where the attacker controls a router along the normal point of traffic communication between two communicating systems. It can also occur where the attacker is located on the same broadcast domain with one of the systems.  The attacker uses several tools like packet creator, Ettercap, Cain e Abel and Dsniff that are efficient in LAN networks. The tools manifest Arp spoof capabilities that that permit interceptions. The man in the middle can attack and modify a HTTP because the HTTP traffic is unencrypted and contains no authen tication. It can also attempt to intercept HTTPS traffic by using a custom certificate. The attacker uses proxy tools like Paros Prox and Proxy Fuzz to interact with HTTP protocol (OWASP, 2009, p.1). The man in the middle attack takes advantage of weak network communication protocols to convince a host to route the information through the attacker instead of through the normal router. However, the man in the middle attack is also affirmative in developing a step of a web application and in creating Web Vulnerability assessments. Because of these attacks, the computer technological sector has derived various ways to secure to the communications in the systems in Multichannel and Multi-level Authentication security protocols. To ensure data integrity and originator authenticity between devices such as Personal Digital Assistants (PDAs) whose owners has no past

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.