Member-only story
Hi everyone, welcome back. Cyber security is an important area of focus. There is a whole lot of data that is being stored and transmitted digitally. This includes sensitive data that could potentially cause damage to someone or even a whole company. We will go over some common interceptive attacks which occur between a client and a server. Let’s get into it.
Man-In-The-Middle Attacks
A Man-In-The-Middle(MITM) attack occurs when an attacker intercepts internet traffic between two users. The attacker then becomes capable of changing information within the network package, acting as a man in the middle, freely changing the back and forth conversation. The users will appear that they are talking directly to each other and not realize that there is a man in the middle who is manipulating the conversation. This type of attack is commonly used to gather information.
Man-In-The-Browser Attacks
A Man-In-The-Browser(MITB) attack is similar to a MITM attack. A Trojan Horse is installed by either a malicious plugin or script and is used to manipulate calls on a web application. This type of attack is capable of stealing information and stealing money as it is also capable of manipulating online transactions.