2. Introduction to MitM Attacks
• - A cyberattack where an attacker intercepts
communication between two parties.
• - Victims are unaware while sensitive data is
stolen or manipulated.
• - Common in financial transactions, login
sessions, and data exchanges.
4. Types of Man-in-the-Middle
Attacks
• - Email Hijacking
• - Wi-Fi Eavesdropping
• - DNS Spoofing & IP Spoofing
• - Session Hijacking & SSL Hijacking
5. Email Hijacking
• - Attackers gain access to email accounts.
• - They monitor transactions and send
fraudulent messages.
• - Example: Fake bank emails requesting
credentials.
6. Wi-Fi Eavesdropping
• - Attackers set up fake Wi-Fi networks to
intercept data.
• - Users unknowingly connect and expose
sensitive data.
• - Prevention: Avoid public Wi-Fi or use VPNs.
7. DNS Spoofing & IP Spoofing
• - Redirects users to fake websites.
• - Users unknowingly enter credentials into
fraudulent sites.
• - Prevention: Check for HTTPS, use secure DNS
services.
8. Session Hijacking & SSL Hijacking
• - Attackers steal session cookies or break SSL
encryption.
• - Allows them to impersonate legitimate users.
• - Prevention: Use strong encryption, multi-
factor authentication (MFA).
10. Detecting MitM Attacks
• - Unexpected disconnections from services.
• - Strange or mismatched URLs.
• - Unsecured or suspicious public Wi-Fi
networks.
• - Unexpected SSL/TLS certificate warnings.
11. How to Prevent MitM Attacks
• - Keep routers updated and secure.
• - Use VPNs and end-to-end encryption.
• - Keep software and security patches updated.
• - Use strong passwords and multi-factor
authentication (MFA).
• - Only visit secure websites (HTTPS).
• - Implement Zero-Trust security models.
12. Conclusion
• - MitM attacks are serious cybersecurity
threats.
• - Awareness and preventive measures are
crucial.
• - Stay informed, use security best practices,
and protect sensitive data.