Member-only story

Cyber Security: Interceptive Attacks

Jesse L
2 min readDec 14, 2021

--

Hi everyone, welcome back. Cyber security is an important area of focus. There is a whole lot of data that is being stored and transmitted digitally. This includes sensitive data that could potentially cause damage to someone or even a whole company. We will go over some common interceptive attacks which occur between a client and a server. Let’s get into it.

Man-In-The-Middle Attacks

A Man-In-The-Middle(MITM) attack occurs when an attacker intercepts internet traffic between two users. The attacker then becomes capable of changing information within the network package, acting as a man in the middle, freely changing the back and forth conversation. The users will appear that they are talking directly to each other and not realize that there is a man in the middle who is manipulating the conversation. This type of attack is commonly used to gather information.

Man-In-The-Browser Attacks

A Man-In-The-Browser(MITB) attack is similar to a MITM attack. A Trojan Horse is installed by either a malicious plugin or script and is used to manipulate calls on a web application. This type of attack is capable of stealing information and stealing money as it is also capable of manipulating online transactions.

Replay Attacks

--

--

Jesse L
Jesse L

Written by Jesse L

Hi, I'm a passionate technology enthusiast and lifelong learner. Beyond my technical pursuits, I'm also passionate about sharing my enthusiasm with others.

No responses yet