introduction and illustration of the man-in-the-middle attack
Have you ever wondered how the hacker in those spy movies is able to get specific information from a certain person without even being detected? Well, there are various no. of ways by which they do so. Today we will be learning a particular type of attack which will be enabling us to do the same by using a brilliant technique called “MAN IN THE MIDDLE(MITM)” What is Man In The Middle (MITM) attack? Although "man-in-the-middle" is frequently associated with attacks, it is a very simple and effective way to gather info. It is a general word to describe any device that stands between your computer and the target. That said, you can imagine what becomes possible when an attacker can place themselves between your data and a destination: stolen personal information, passwords/credentials, financial information, general browsing history, and more. All of these types of information fall under a category that most would refer to as "sensitive information". How a MITM...