Icon Crear Crear

Session 04- MitM Attacks

Completar frases

Subject : Security and Privacy Risks in Computer & Internet Applications
Lecturer: Assoc. Prof. Dr. James Joshi
Faculty: Graduate School of Information Technology
Siam University, Bangkok, Thailand

Descarga la versión para jugar en papel

Edad recomendada: 21 años
0 veces realizada

Creada por

Tailandia

Top 10 resultados

Todavía no hay resultados para este juego. ¡Sé el primero en aparecer en el ranking! para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Completar frases

Session 04- MitM AttacksVersión en línea

Subject : Security and Privacy Risks in Computer & Internet Applications Lecturer: Assoc. Prof. Dr. James Joshi Faculty: Graduate School of Information Technology Siam University, Bangkok, Thailand

por Prince Parham
1

traffic injecting mangling Hijacking router filtering ARP sniff ARP Sniffing

1 . is the easiest attack to launch since all the packets transit through the attacker . All the " plain text " protocols are compromised ( the attacker can user and password of many widely used protocol such as telnet , ftp , http )

2 . isn't blind ( the attacker knows exactly the sequence numbers of the TCP connection ) .

3 . Within , the attacker can modify the sequence numbers and keep the connection synchronized while injecting packets .

4 . Within , the attacker can modify the payload of the packets by recalculating the checksum .

5 . Within poisoning , the attacker can forge a spoofed ICMP packets to force the host to make an ARP request . Immediately after the ICMP it sends the fake replay .

6 . STP is not a real MITM attack since the attacker is able to receive only " unmanaged " traffic .

7 . Within ICMP redirect , the attacker can forge ICMP redirect packet in order to Redirect to himself .

8 . Within IRDP spoofing , The attacker can forge some advertisement packet pretending to be the for the LAN . He / she can set the " preference level " and the " lifetime " at high values to be sure the hosts will choose it as the preferred router .

educaplay suscripción