Examples of MITM
In this example, let's say we have victim A, victim B, and an attacker. Victim A and victim B are friends in real life, but are often busy and don't see each other face to face very often, so they communicate through text. The scenario is that victim A is currently sending messages to victim B about selling a car, which victim B agrees to buy. Victim B sends a message back regarding which account to send money to for purchasing the car. That was a major mistake because both victims were vulnerable of an attacker who was monitoring the entire conversation from the start and completed the attack by manipulated the accounts number in the messages.
Another example of an MITM attack is using a cloned web page to gain access to ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access