Cybersecurity
threats
Pocket Sniffing, Replay
and man in the middle
01 02 03
Pocket sniffing Replay Man in the middle
Capturing data over Intercepting and Intercepting
unsecured networks retransmitting valid communication
data between two parties
Pocket Sniffing
●Pocket sniffing involves the clandestine
capturing of data transmitted over
unsecured networks, particularly Wi-Fi.
●Using specialized tools like packet
sniffers, hackers intercept data packets,
exposing sensitive information.
●This can be likened to someone
rummaging through your pockets to
steal your valuables.
How does Pocket
Sniffing work?
•
• Hackers intercept data packets traveling through the
air, including emails, passwords, and browsing
activity.
• By analysing these intercepted packets, attackers can
extract valuable information about users and their
activities.
• It's akin to eavesdropping on digital conversations,
breaching privacy and confidentiality.
Consequences of packet
sniffing
• The consequences of pocket sniffing can be dire,
ranging from financial loss to identity theft and
privacy invasion.
• Once your sensitive information is compromised, it
can be exploited for various malicious purposes.
• Victims may suffer severe repercussions, such as
drained bank accounts or fraudulent activities
carried out in their name.
Replay Attack
• Replay attacks involve intercepting and
retransmitting legitimate data to gain
unauthorized access to systems or networks.
• Attackers replay captured data packets to
deceive systems into believing they are
legitimate users.
• This is analogous to playing a recorded
message to gain entry to a secured building
without proper authorization.
Types of replay attacks
Challenge-
Time- response
Intercepting and
based
mimicking
authentication
challenges and
responses.
Session- Replaying
intercepted data
based within a time
Reusing captured frame.
session
credentials for
unauthorized
access.
Impact of
replay attack
• The impact of replay attacks can be significant,
resulting in impersonation, data manipulation,
and unauthorized access.
• Attackers can masquerade as legitimate users,
alter sensitive data, or gain unauthorized entry
to secure systems.
• This can lead to financial loss, reputational
damage, or even legal ramifications for affected
individuals or organizations.
Man-in-the-middle
• Man-in-the-Middle attacks occur when a
malicious actor intercepts communication
between two parties without their knowledge.
• By positioning themselves between the
sender and receiver, attackers can eavesdrop
on and manipulate the transmitted data.
• It's akin to a stealthy third party secretly
listening in on your private conversations.
Techniques used in
• These techniques allow attackers
MITM attacks
to redirect traffic, intercept DNS
sensitive information, and
Spoofing
impersonate legitimate entities.
ARP Manipulating DNS
Spoofing
responses to
redirect users to
malicious sites.
SSL Falsifying ARP
Stripping messages to
associate fake
Downgrading
• Victims may unwittingly
MAC addresses. communicate with the attacker
HTTPS
connections to instead of the intended
HTTP for recipient, leading to data theft
interception and or manipulation.
tampering.
Examples of MITM
attacks
• Wi-Fi eavesdropping, email hijacking, and session
hijacking are prevalent examples of Man-in-the-Middle
attacks.
• Attackers can intercept Wi-Fi traffic to capture sensitive
information, hijack email accounts to send fraudulent
messages, or hijack sessions to gain unauthorized access
to online accounts.
• These attacks can result in compromised data, financial
loss, and damage to an individual's or organization's
reputation.
Real-world consequences
• The real-world consequences of Man-in-the-Middle
attacks can be severe, including loss of sensitive
information, financial theft, and compromised security.
• Victims may suffer financial losses, identity theft, or
reputational damage as a result of their compromised
security.
• The ramifications of such attacks extend beyond the
digital realm, impacting individuals' personal and
professional lives.
Defending
against cyber
threats
• To defend against cyber threats like Pocket Sniffing,
Replay Attacks, and Man-in-the-Middle Attacks, it's
essential to employ robust security measures.
• Utilize encrypted connections, implement strong
authentication mechanisms, and regularly update
software to patch vulnerabilities.
• By adopting a proactive approach to cybersecurity,
individuals and organizations can mitigate the risk of
falling victim to cyber attacks.
Importance of education
and awareness
• Education and awareness are paramount in the fight
against cyber threats.
• By educating users about common threats and
promoting cybersecurity awareness, we can
empower individuals to recognize and mitigate
potential risks.
• Knowledge is the first line of defence against cyber
attacks, and by staying informed, users can better
protect themselves and their sensitive information.
Conclusion
• In conclusion, Pocket Sniffing, Replay Attacks, and Man-in-the-
Middle Attacks pose significant threats to cybersecurity.
• By understanding how these attacks work and implementing effective
countermeasures, individuals and organizations can better protect
themselves against cyber threats.
• Together, let's work towards creating a safer digital environment for all
users.
Q/A
Does anyone have any
questions?
Thank
you!
Done by: Namirah Sirat Sabreen 6D