MAN IN THE MIDDLE (FOR NOT SECURE SITES).





Man in The Middle attack very very famous and popular attack practiced by the hackers to any victim or any Organisation or any Association .

As the Name:- Man In The Middle (MAM) attack this thing refers to spoof a user for non secure sites ( http sites) or stealing data without knowing the victim.

This MAM attack can be done locally or remotely .



For local Use Example:-
Set up a wireless Hots pot having internet connection So that users connect to that wireless Hots pot. As you  are the creator of that Hots pot you have the access to view all the information users are viewing or you can setup the restrictions what they view what they not  in this way you can steal the Private information suchlike passwords of their bank or passwords of their social network accounts or any personal details or you can see the the website they are visiting or the images they are viewing (Only For Non Secure Sites ). 
You can also Redirect the user to the other website (for phishing or any other things) .

For Remote use Example:-
For this thing you have to setup a private connection between user to you and you to the ISP or the internet in such a way you have the access to all the requests ex:- visiting any website .
In this also you can do everything which you can do in local MAM (Man in The Middle Attack ).

How to be safe From MAN IN THE MIDDLE ATTACK .


  • Don't connect to Unknown Hots Pot.
  • Don't connect to Unknown VPN(virtual private network) service.
  • Don't click the unknown links .
  • Always keep on your Firewall And Antivirus (Internet security).

**COMMENT DOWN FOR ANY QUERY OR PROBLEM

Comments

POPULAR ONES

HOW TO HACK WI-FI USING FERM WI-FI CRACKER

HOW TO HACK WI-FI USING KALI LINUX .

A GIFT FOR YOU ALL .( VIRUSES FOR HACKING AND SPOOFING )