How Man in The middle Attacks operates-01994
This subjective question is related to the book/course vu mgt411 Money & Banking. It can also be found in vu mgt411 Mid Term Solved Past Paper No. 7.
Man in the middle attacks
In it the attacker is able to monitor, capture and control data between sending and receiving machines. He may apply IPaddress spoofing technique to divert the packets to its machine, then modify the packets and resend the misleadinginformation to the actual client. Another form of man-in-themiddle attack is where the hacker is able to substitute the IP address of a genuine web site with the IP address of his ownweb site due to some security hole in the software that runson a domain name server. A client would think that he iscommunicating or receiving the information form a genuineweb site, though it would not be the case actually.