Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
27 views17 pages

Cybersecurity Threats: Sniffing, Replay, MITM

Uploaded by

namirahafreen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views17 pages

Cybersecurity Threats: Sniffing, Replay, MITM

Uploaded by

namirahafreen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Cybersecurity

threats
Pocket Sniffing, Replay
and man in the middle
01 02 03
Pocket sniffing Replay Man in the middle
Capturing data over Intercepting and Intercepting
unsecured networks retransmitting valid communication
data between two parties
Pocket Sniffing
●Pocket sniffing involves the clandestine
capturing of data transmitted over
unsecured networks, particularly Wi-Fi.

●Using specialized tools like packet


sniffers, hackers intercept data packets,
exposing sensitive information.

●This can be likened to someone


rummaging through your pockets to
steal your valuables.
How does Pocket
Sniffing work?


• Hackers intercept data packets traveling through the
air, including emails, passwords, and browsing
activity.

• By analysing these intercepted packets, attackers can


extract valuable information about users and their
activities.

• It's akin to eavesdropping on digital conversations,


breaching privacy and confidentiality.
Consequences of packet
sniffing

• The consequences of pocket sniffing can be dire,


ranging from financial loss to identity theft and
privacy invasion.

• Once your sensitive information is compromised, it


can be exploited for various malicious purposes.

• Victims may suffer severe repercussions, such as


drained bank accounts or fraudulent activities
carried out in their name.
Replay Attack
• Replay attacks involve intercepting and
retransmitting legitimate data to gain
unauthorized access to systems or networks.

• Attackers replay captured data packets to


deceive systems into believing they are
legitimate users.

• This is analogous to playing a recorded


message to gain entry to a secured building
without proper authorization.
Types of replay attacks

Challenge-
Time- response
Intercepting and

based
mimicking
authentication
challenges and
responses.
Session- Replaying
intercepted data
based within a time
Reusing captured frame.
session
credentials for
unauthorized
access.
Impact of
replay attack
• The impact of replay attacks can be significant,
resulting in impersonation, data manipulation,
and unauthorized access.

• Attackers can masquerade as legitimate users,


alter sensitive data, or gain unauthorized entry
to secure systems.

• This can lead to financial loss, reputational


damage, or even legal ramifications for affected
individuals or organizations.
Man-in-the-middle
• Man-in-the-Middle attacks occur when a
malicious actor intercepts communication
between two parties without their knowledge.

• By positioning themselves between the


sender and receiver, attackers can eavesdrop
on and manipulate the transmitted data.

• It's akin to a stealthy third party secretly


listening in on your private conversations.
Techniques used in
• These techniques allow attackers
MITM attacks
to redirect traffic, intercept DNS
sensitive information, and
Spoofing
impersonate legitimate entities.
ARP Manipulating DNS

Spoofing
responses to
redirect users to
malicious sites.
SSL Falsifying ARP
Stripping messages to
associate fake
Downgrading
• Victims may unwittingly
MAC addresses. communicate with the attacker
HTTPS
connections to instead of the intended
HTTP for recipient, leading to data theft
interception and or manipulation.
tampering.
Examples of MITM
attacks
• Wi-Fi eavesdropping, email hijacking, and session
hijacking are prevalent examples of Man-in-the-Middle
attacks.

• Attackers can intercept Wi-Fi traffic to capture sensitive


information, hijack email accounts to send fraudulent
messages, or hijack sessions to gain unauthorized access
to online accounts.

• These attacks can result in compromised data, financial


loss, and damage to an individual's or organization's
reputation.
Real-world consequences

• The real-world consequences of Man-in-the-Middle


attacks can be severe, including loss of sensitive
information, financial theft, and compromised security.

• Victims may suffer financial losses, identity theft, or


reputational damage as a result of their compromised
security.

• The ramifications of such attacks extend beyond the


digital realm, impacting individuals' personal and
professional lives.
Defending
against cyber
threats
• To defend against cyber threats like Pocket Sniffing,
Replay Attacks, and Man-in-the-Middle Attacks, it's
essential to employ robust security measures.

• Utilize encrypted connections, implement strong


authentication mechanisms, and regularly update
software to patch vulnerabilities.

• By adopting a proactive approach to cybersecurity,


individuals and organizations can mitigate the risk of
falling victim to cyber attacks.
Importance of education
and awareness
• Education and awareness are paramount in the fight
against cyber threats.

• By educating users about common threats and


promoting cybersecurity awareness, we can
empower individuals to recognize and mitigate
potential risks.

• Knowledge is the first line of defence against cyber


attacks, and by staying informed, users can better
protect themselves and their sensitive information.
Conclusion
• In conclusion, Pocket Sniffing, Replay Attacks, and Man-in-the-
Middle Attacks pose significant threats to cybersecurity.

• By understanding how these attacks work and implementing effective


countermeasures, individuals and organizations can better protect
themselves against cyber threats.

• Together, let's work towards creating a safer digital environment for all
users.
Q/A
Does anyone have any
questions?
Thank
you!
Done by: Namirah Sirat Sabreen 6D

You might also like