Network Vulnerabilities
MitM Attack - man-in-the-middle
A cyber attack where an attacker intercepts and potentially alters communications between two parties without their knowledge. Can lead to eavesdropping on sensitive information, data manipulation, and unauthorised access to confidential data.
Types
ARP poisoning
Also known as ARP spoofing A type of attack where an attacker sends falsified ARP messages over a local network.
Attack Process
the attacker sends out ARP packets that associate their MAC address with their IP address of a legitimate device on the network. This misleads other devices into sending data intended for the legitimate device to the attacker’s machine instead.
Consequences
ARP poisoning can lead to various attacks, such as Man-in-the-Middle (MitM) attacks, where the attacker intercepts and potentially alters communications between devices. It can also enable denial of service attacks and unauthorised access to sensitive information.
SSL Stripping
SSL stripping is a type of man-in-the-middle (MITM) attack where an attacker downgrades a secure HTTPS connection to an unsecure HTTP connection. This allows the attacker to intercept and potentially modify the data being transmitted between a client and a server.
Port stealing
IP address spoofing
ICMP redirection
SSL hijacking
HTTPS Spoofing
Buffer Overflow Attack
Memory-safe programming languages check array bounds Unsafe languages, such as C and C++, don’t check Buffer overflows in network code are one of the main sources of security problems
- If you write network code in C/C++, be very careful to check array bounds
- If your code can be crashed by received network traffic, it probably has an exploitable buffer overflow