zoukankan      html  css  js  c++  java
  • Penetration Test

    Man in the middle exploits

    ADDITIONAL NETWORK EXPLOITS
    • Man-in-the-middle
      • Family of attacks where the attack intercepts messages between a sender and receiver
      • Attack may modify, regenerate, or forward intercepted messages

    image-20200917205931797

    image-20200917210057779

    MAN-IN-THE-MIDDLE EXPLOITS
    • ARP spoofing
      • Similar to DNS poisoning, but with local MAC address
    • Pass the hash
      • Attacker intercepts an NTLM hash (user credential) and reuses it to appear as an authenticated user to Windows
    • Replay
    • Relay
    • SSL(Secure Sockets Layer) stripping
    • Downgrade
    • DoS(Denial of Service)/stress test
    • NAC(Network Access Control) bypass
    • VLAN (Virtual Local Area Network) hopping
    QUICK REVIEW
    • MITM attacker intercepts all traffic between sender and receiver
    • May be part of an attack chain
    • Multiple MITM possibilities, including ARP spoofing, pass the hash, replay attack
    • Useful to bypass normal network security controls
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    mysql8下载安装及配置
    jdk11下载安装及环境变量配置
    展示所有商品案例
    事务(转账实例)
    Part2.7 ESLint
    Part2.6 Webpack
    Part2.5 模块化开发
    Part2.4 gulp 实践
    Part2.3 Grunt
    Part2.2 plop 使用
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13687710.html
Copyright © 2011-2022 走看看