1 / 10

Objectives

Learn about man-in-the-middle attacks, how they are performed, and ways to recognize and prevent them. Discover the concept of ARP poisoning and how it can be used to intercept and alter communication between two parties. Explore different scenarios through a group-based activity.

larryw
Download Presentation

Objectives

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Objectives • Remember that people (and machines) are not always who they say they are! • Recognise what a Man in the Middle attack is • Learn some of the ways that MITM attacks can be performed

  2. RedirectPersonalMail

  3. In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

  4. Evil TwinAttack

  5. Captive Portal Login Screen

  6. ARP – Address Resolution Protocol Open a command prompt [Win-R] cmd [ENTER] Enter arp –a to view the ARP cache which links IP addresses of machines you have talked to and their MAC addreses Now ping the IP address of one of your neighbours Look up their MAC address in the ARP cache Can you find the MAC address of your gateway router?

  7. ARP Poisoning or ARP Spoofing • Machines cache the links between IP addresses and MAC addresses to make communication faster and easier. But false entries are like poison! • Spoofing means disguising a communication from an unknown source as being from a known, trusted source.  • So, if you send out ARP packets to link your network adapter's MAC address and other machines' IP addresses you can get those machines to communicate through you. • You become the Man in the Middle!

  8. Charlie the HackerGroups of 4 – Each person plays a character • Adam - honest • Brian - honest • Charlie the Hacker – can tell lies • Dave - honest Sheets are for your eyes only, but you are allowed to ask one another Yes/No questions and give Yes/No answers. Read your sheet carefully and follow the rules! You have 5 minutes to win

  9. Questions to discuss in your group • How might you know that someone is definitely lying? • MITM is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other So was Charlie performing an MITM Attack? • Give reasons for saying Yes • Give reasons for saying No

More Related