Compléter Session 05- MitM Attacks IIVersion en ligne Subject : Security and Privacy Risks in Computer & Internet Applications Lecturer: Assoc. Prof. Dr. James Joshi Faculty: Graduate School of Information Technology Siam University, Bangkok, Thailand par Prince Parham 1 intercept cryptographic authentication relays Public keys JavaScript eavesdropping 1 . Based on the " Mitigating a Fallacy " rules : Executing on victim = = executing an attack 2 . The man - in - the - middle attack ( often abbreviated MitM , also known as a bucket brigade attack , or sometimes Janus attack ) in cryptography and computer security is a form of active in which the attacker makes independent connections with the victims and messages between them , making them believe that they are talking directly to each other over a private connection , when in fact the entire conversation is controlled by the attacker . 3 . The attacker must be able to all messages going between the two victims and inject new ones , which is straightforward in many circumstances ( for example , an attacker within reception range of an unencrypted Wi - Fi wireless access point , can insert himself as a man - in - the - middle ) . 4 . A man - in - the - middle attack can succeed only when the attacker can impersonate each endpoint to the satisfaction of the other ? it is an attack on mutual ( or lack thereof ) . Most protocols include some form of endpoint authentication specifically to prevent MITM attacks . For example , SSL can authenticate one or both parties using a mutually trusted certification authority . 5 . Various defenses against MITM attacks use authentication techniques that are based on the key infrastructures . 6 . Stronger mutual authentication , such as : Secret ( which are usually high information entropy secrets , and thus more secure ) , or Passwords ( which are usually low information entropy secrets , and thus less secure ) .