SlideShare a Scribd company logo
Man-in-the-Middle Attack
(HTTP)
 The man-in-the middle attack intercepts a
communication between two systems.
 For example, in an http transaction the target
is the TCP connection between client and
server.
 The MITM(http) attack is very effective because
of the nature of the http protocol and data
transfer which are all ASCII based.
 There are several tools to realize a MITM
attack(http). These tools are particularly
efficient in LAN network environments.
 tcpdump and wireshark are the tools that can
be used to attack the victims in the network
nodes.
 In this scenario is I am using Wireshark, to
attack the vulnerability in between the network
nods.
 Wireshark is a powerful network protocol
analyzer. It can go to the deepest level of
packet inspection .
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
Man in-the-middle attack(http)
 CWE-318: Clear text Storage of Sensitive Information in
Executable.
 Summary:
The application stores sensitive information in clear text
in an executable.
Extended Description :
Attackers can reverse engineer binary code to obtain
secret data. This is especially easy when the clear text is
plain ASCII. Even if the information is encoded in a way
that is not human readable, certain techniques could
determine which encoding is being used, then decode the
information.

More Related Content

PPTX
Man in the middle attack .pptx
PradeepKumar728006
 
PPTX
Man in The Middle Attack
Deepak Upadhyay
 
PPT
DDoS Attacks
Jignesh Patel
 
PPTX
Different types of attacks in internet
Rohan Bharadwaj
 
PPT
Port Scanning
amiable_indian
 
PPTX
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
 
PPTX
Social engineering presentation
pooja_doshi
 
PDF
Introduction to penetration testing
Amine SAIGHI
 
Man in the middle attack .pptx
PradeepKumar728006
 
Man in The Middle Attack
Deepak Upadhyay
 
DDoS Attacks
Jignesh Patel
 
Different types of attacks in internet
Rohan Bharadwaj
 
Port Scanning
amiable_indian
 
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
 
Social engineering presentation
pooja_doshi
 
Introduction to penetration testing
Amine SAIGHI
 

What's hot (20)

PPTX
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
PDF
What is botnet?
Milan Petrásek
 
PPTX
Cyber security
vishakha bhagwat
 
PPTX
DoS Attack - Incident Handling
Marcelo Silva
 
PPTX
Denial of service
garishma bhatia
 
PPTX
Cyber Terrorism
Deepak Pareek
 
PPTX
Basics of Denial of Service Attacks
Hansa Nidushan
 
PPTX
Présentation Mémoire Cybersecurity .pptx
KODJO10
 
PPTX
Intrusion detection system
Roshan Ranabhat
 
PDF
Cyber Threat Intelligence
mohamed nasri
 
PPTX
Dos n d dos
sadhana21297
 
PPT
DDOS Attack
Ahmed Salama
 
PPT
Cyber crime
Muhammad Osama Khalid
 
PPTX
Social engineering
Abdelhamid Limami
 
PPTX
Man in the middle
AhmadThaqifAimanAhma
 
PPTX
Malware ppt final.pptx
LakshayNRReddy
 
PPT
Network Security Threats and Solutions
Colin058
 
PPTX
Ppt
Geetu Khanna
 
PDF
Threat Intelligence
Deepak Kumar (D3)
 
PPTX
Man in the middle attack (mitm)
Hemal Joshi
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
 
What is botnet?
Milan Petrásek
 
Cyber security
vishakha bhagwat
 
DoS Attack - Incident Handling
Marcelo Silva
 
Denial of service
garishma bhatia
 
Cyber Terrorism
Deepak Pareek
 
Basics of Denial of Service Attacks
Hansa Nidushan
 
Présentation Mémoire Cybersecurity .pptx
KODJO10
 
Intrusion detection system
Roshan Ranabhat
 
Cyber Threat Intelligence
mohamed nasri
 
Dos n d dos
sadhana21297
 
DDOS Attack
Ahmed Salama
 
Social engineering
Abdelhamid Limami
 
Man in the middle
AhmadThaqifAimanAhma
 
Malware ppt final.pptx
LakshayNRReddy
 
Network Security Threats and Solutions
Colin058
 
Threat Intelligence
Deepak Kumar (D3)
 
Man in the middle attack (mitm)
Hemal Joshi
 
Ad

Viewers also liked (19)

ODP
Man in the middle
Héctor Romeero López
 
PDF
Analyzing Bitcoin Security
removed_5ef8f4100b1d7e8bfe3d2dc557fe10d0
 
PPTX
Arp spoofing slides
Luthfi Widyanto
 
PPTX
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
PPT
BotNet Attacks
Rangana lakmal
 
PPTX
man in the middle
apurv_verma007
 
PPTX
Introduction to Bitcoins and Cryptocurrency
Utkarsh Gupta
 
PPT
Botnet Detection Techniques
Team Firefly
 
PPTX
Ppt.1
veeresh35
 
PPTX
Man In The Middle - Hacking Illustrated
InfoSec Institute
 
PPT
Arp spoofing
Luthfi Widyanto
 
PPTX
Bitcoin technology
Wajid Hamdani
 
PPTX
Bitcoin (Global Digital Currency)
Paramkusa K
 
PDF
PSFK Presents the Future of Digital Safety & Security
PSFK
 
PPTX
Cybercrime.ppt
Aeman Khan
 
PPTX
Cyber-crime PPT
Anshuman Tripathi
 
PPTX
Cyber security
Siblu28
 
PDF
Mobile-First SEO - The Marketers Edition #3XEDigital
Aleyda Solís
 
Man in the middle
Héctor Romeero López
 
Analyzing Bitcoin Security
removed_5ef8f4100b1d7e8bfe3d2dc557fe10d0
 
Arp spoofing slides
Luthfi Widyanto
 
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
BotNet Attacks
Rangana lakmal
 
man in the middle
apurv_verma007
 
Introduction to Bitcoins and Cryptocurrency
Utkarsh Gupta
 
Botnet Detection Techniques
Team Firefly
 
Ppt.1
veeresh35
 
Man In The Middle - Hacking Illustrated
InfoSec Institute
 
Arp spoofing
Luthfi Widyanto
 
Bitcoin technology
Wajid Hamdani
 
Bitcoin (Global Digital Currency)
Paramkusa K
 
PSFK Presents the Future of Digital Safety & Security
PSFK
 
Cybercrime.ppt
Aeman Khan
 
Cyber-crime PPT
Anshuman Tripathi
 
Cyber security
Siblu28
 
Mobile-First SEO - The Marketers Edition #3XEDigital
Aleyda Solís
 
Ad

Similar to Man in-the-middle attack(http) (20)

PPTX
Man in-the-middle attack(http)
Togis UAB Ltd
 
PPTX
Cybersecurity _ Man in the Middle (MITM) Attack.pptx
Rejwana1
 
PPTX
Cybersecurity _ Man in the Middle (MITM) Attack.pptx
GulsanaBegumChowdhur
 
PDF
Mattias eriksson
Hai Nguyen
 
PPTX
Middle man cheating
tarunikahsundrajahpi
 
PPTX
detailed power point presentation on man in the middle attack
varunruhal21
 
PDF
Ijaci vol4 no1-maninbrowser
Hai Nguyen
 
PPTX
Dos & Ddos Attack. Man in The Middle Attack
marada0033
 
PDF
Man in the middle attacks
BurtPepper
 
PPTX
PPT CYBER GYAN VIRTUAL INTERNSHIP .pptx
youyousolution
 
PDF
IRJET- Security from Man-In-The-Middle-Attack
IRJET Journal
 
PDF
Defending Man In The Middle Attacks
IRJET Journal
 
PPTX
Lecture 7 Attacker and there tools.pptx
AsmaaLafi1
 
KEY
New School Man-in-the-Middle
Tom Eston
 
PDF
Mitm
Hai Nguyen
 
PDF
Mitm - Man in the Middle Attack & its Security
Deepanshu Kapoor
 
PPT
NetworkSecurity
Peter Lawrence
 
PPTX
CYBER SECURITY PPT.pptxhshhshshdgddggdgddgdg
pk2837898
 
PPT
Lecture 5
Education
 
Man in-the-middle attack(http)
Togis UAB Ltd
 
Cybersecurity _ Man in the Middle (MITM) Attack.pptx
Rejwana1
 
Cybersecurity _ Man in the Middle (MITM) Attack.pptx
GulsanaBegumChowdhur
 
Mattias eriksson
Hai Nguyen
 
Middle man cheating
tarunikahsundrajahpi
 
detailed power point presentation on man in the middle attack
varunruhal21
 
Ijaci vol4 no1-maninbrowser
Hai Nguyen
 
Dos & Ddos Attack. Man in The Middle Attack
marada0033
 
Man in the middle attacks
BurtPepper
 
PPT CYBER GYAN VIRTUAL INTERNSHIP .pptx
youyousolution
 
IRJET- Security from Man-In-The-Middle-Attack
IRJET Journal
 
Defending Man In The Middle Attacks
IRJET Journal
 
Lecture 7 Attacker and there tools.pptx
AsmaaLafi1
 
New School Man-in-the-Middle
Tom Eston
 
Mitm - Man in the Middle Attack & its Security
Deepanshu Kapoor
 
NetworkSecurity
Peter Lawrence
 
CYBER SECURITY PPT.pptxhshhshshdgddggdgddgdg
pk2837898
 
Lecture 5
Education
 

Man in-the-middle attack(http)

  • 2.  The man-in-the middle attack intercepts a communication between two systems.  For example, in an http transaction the target is the TCP connection between client and server.
  • 3.  The MITM(http) attack is very effective because of the nature of the http protocol and data transfer which are all ASCII based.  There are several tools to realize a MITM attack(http). These tools are particularly efficient in LAN network environments.
  • 4.  tcpdump and wireshark are the tools that can be used to attack the victims in the network nodes.  In this scenario is I am using Wireshark, to attack the vulnerability in between the network nods.  Wireshark is a powerful network protocol analyzer. It can go to the deepest level of packet inspection .
  • 15.  CWE-318: Clear text Storage of Sensitive Information in Executable.  Summary: The application stores sensitive information in clear text in an executable. Extended Description : Attackers can reverse engineer binary code to obtain secret data. This is especially easy when the clear text is plain ASCII. Even if the information is encoded in a way that is not human readable, certain techniques could determine which encoding is being used, then decode the information.