Man in-the-middle attack(http)
-
Upload
dawit-tesfayohannes-haile -
Category
Documents
-
view
40 -
download
4
Transcript of Man in-the-middle attack(http)
![Page 1: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/1.jpg)
A5 - SECURITY MISCONFIGURATION
Man-in-the-Middle Attack (HTTP)
![Page 2: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/2.jpg)
Man-in-the-middle attack(http)
The man-in-the middle attack intercepts a communication between two systems.
For example, in an http transaction the target is the TCP connection between client and server.
![Page 3: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/3.jpg)
The MITM(http) attack is very effective because of the nature of the http protocol and data transfer which are all ASCII based.
There are several tools to realize a MITM attack(http). These tools are particularly efficient in LAN network environments.
![Page 4: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/4.jpg)
tcpdump and wireshark are the tools that can be used to attack the victims in the network nodes.
In this scenario is I am using Wireshark, to attack the vulnerability in between the network nods.
Wireshark is a powerful network protocol analyzer. It can go to the deepest level of packet inspection .
![Page 5: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/5.jpg)
![Page 6: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/6.jpg)
![Page 7: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/7.jpg)
![Page 8: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/8.jpg)
![Page 9: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/9.jpg)
![Page 10: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/10.jpg)
![Page 11: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/11.jpg)
![Page 12: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/12.jpg)
![Page 13: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/13.jpg)
![Page 14: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/14.jpg)
![Page 15: Man in-the-middle attack(http)](https://reader034.fdocuments.us/reader034/viewer/2022042615/55c455b6bb61ebb24e8b45fe/html5/thumbnails/15.jpg)
Common Weakness Enumeration
CWE-318: Clear text Storage of Sensitive Information in Executable.
Summary: The application stores sensitive information in clear text in an executable.
Extended Description :Attackers can reverse engineer binary code to obtain secret data. This is especially easy when the clear text is plain ASCII. Even if the information is encoded in a way that is not human readable, certain techniques could determine which encoding is being used, then decode the information.