zoukankan      html  css  js  c++  java
  • Penetration Test

    Man in the middle exploits

    ADDITIONAL NETWORK EXPLOITS
    • Man-in-the-middle
      • Family of attacks where the attack intercepts messages between a sender and receiver
      • Attack may modify, regenerate, or forward intercepted messages

    image-20200917205931797

    image-20200917210057779

    MAN-IN-THE-MIDDLE EXPLOITS
    • ARP spoofing
      • Similar to DNS poisoning, but with local MAC address
    • Pass the hash
      • Attacker intercepts an NTLM hash (user credential) and reuses it to appear as an authenticated user to Windows
    • Replay
    • Relay
    • SSL(Secure Sockets Layer) stripping
    • Downgrade
    • DoS(Denial of Service)/stress test
    • NAC(Network Access Control) bypass
    • VLAN (Virtual Local Area Network) hopping
    QUICK REVIEW
    • MITM attacker intercepts all traffic between sender and receiver
    • May be part of an attack chain
    • Multiple MITM possibilities, including ARP spoofing, pass the hash, replay attack
    • Useful to bypass normal network security controls
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    switch多分枝语句
    自动扫描判断数组奇偶 直接在控制台输入
    if else语句
    1231作业
    字符集和字符编码
    12.28作业
    置顶广告
    图片库
    js实现隔行换色及其鼠标滑过变色
    【转载】display:inline-block兼容ie6/7的写法
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13687710.html
Copyright © 2011-2022 走看看