Spoofing, Man-in-the-Middle and Replay Attacks

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here

Spoofing, Man-in-the-Middle and Replay Attacks: 

Spoofing: Spoofing is a process that alters a packet at the TCP level. The attacker dispatches a packet with an IP address of a known and trusted host to the target host, gaining access as an imposter. The attacker can also masquerade known services such as Web, FTP, and email.

Man-in-the-Middle Attacks: A man-in-the-middle attack is a tactic that’s used to snag information transmitted between two hosts. This method allows the attacker to position itself between the two hosts while remaining invisible to them. This is achieved through altering routing information and DNS values, IP address theft, or defrauding of ARP caches to replicate two legitimate hosts.

Using a man-in-the-middle ploy allows an attacker to obtain logon credentials or sensitive data that is being transmitted, and modify that data before forwarding it to the intended host. To defend against a man-in-the-middle attack, you need to implement DNS protection by blocking access to its records and name caching system.

Replay Attacks: 

View Topics

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?