70 likes | 182 Vues
Join Devin Cook from Auburn University for an in-depth course on Man-in-the-Middle (MITM) attacks. This course covers essential topics including the concept of MITM, networking basics, techniques to become a MITM, and post-exploitation actions. Through engaging exercises and demos, including the Jasager demonstration, you'll learn about common MITM methods like ARP spoofing and the risks of public Wi-Fi networks. Understand how traffic can be intercepted, manipulated, and exploited, and what you can do to protect against these threats.
E N D
Information Assurance Day Course Man-in-the-middle Attacks Devin Cook, Auburn University
Outline • Introduction • The Concept of MITM • Networking Overview • How to become the MITM • What can you do with that? • The Exercise • Jasager Demo
Introduction – MITM User Attacker Service
Introduction – Networking There are many ways that the network can be exploited to start intercepting traffic from a user. There are many components involved in networking, and they are generally represented like so in the OSI model: http://en.wikipedia.org/OSI_model
Introduction – Becoming the MITM We've already discussed some of the attacks, but the easiest and most common ways include ARP spoofing and physically inserting yourself in the middle. The second one is interesting because it doesn't necessarily require any sort of technical exploitation. Think about “free wifi” for a moment... • Restaurants • Hotels • Airports
Introduction – Post-Exploitation So, specifically, what can you do when you control all of a user's traffic? • Inject whatever you want into the pages they view. • Advertisements = $$$$ • Malware • Sniff all data to/from that user. • Blackmail • Steal credentials • Redirect their traffic wherever you want.