Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
21 views2 pages

What Is MITM Attack

A man in the middle (MITM) attack involves a perpetrator intercepting communication between a user and an application to eavesdrop or impersonate one party. The primary goal is to steal sensitive personal information, such as login credentials and financial details, often targeting users of financial applications and e-commerce sites. The information obtained can lead to identity theft, unauthorized transactions, or serve as a foothold for more extensive cyber attacks.

Uploaded by

Apurva Chaudhari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views2 pages

What Is MITM Attack

A man in the middle (MITM) attack involves a perpetrator intercepting communication between a user and an application to eavesdrop or impersonate one party. The primary goal is to steal sensitive personal information, such as login credentials and financial details, often targeting users of financial applications and e-commerce sites. The information obtained can lead to identity theft, unauthorized transactions, or serve as a foothold for more extensive cyber attacks.

Uploaded by

Apurva Chaudhari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

What is MITM attack

A man in the middle (MITM) attack is a general term for when


a perpetrator positions himself in a conversation between a
user and an application—either to eavesdrop or to
impersonate one of the parties, making it appear as if a
normal exchange of information is underway.
The goal of an attack is to steal personal information, such as
login credentials, account details and credit card numbers.
Targets are typically the users of financial applications, SaaS
businesses, e-commerce sites and other websites where
logging in is required.
Information obtained during an attack could be used for
many purposes, including identity theft, unapproved fund
transfers or an illicit password change.
Additionally, it can be used to gain a foothold inside a secured
perimeter during the infiltration stage of an advanced
persistent threat (APT) assault.
Broadly speaking, a MITM attack is the equivalent of a
mailman opening your bank statement, writing down your
account details and then resealing the envelope and
delivering it to your door.
Man in the middle attack example

You might also like