Home
World Journal of Advanced Engineering Technology and Sciences
International, Peer reviewed, Referred, Open access | ISSN Approved Journal

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • WJAETS CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN: 2582-8266 (Online)  || UGC Compliant Journal || Google Indexed || Impact Factor: 9.48 || Crossref DOI

Fast Publication within 2 days || Low Article Processing charges || Peer reviewed and Referred Journal

Research and review articles are invited for publication in Volume 18, Issue 2 (February 2026).... Submit articles

Man-in-the-Middle (MitM) Attacks: Techniques and defenses

Breadcrumb

  • Home
  • Man-in-the-Middle (MitM) Attacks: Techniques and defenses

Bogdan Barchuk *

Independent researcher.

Review Article
 
World Journal of Advanced Engineering Technology and Sciences, 2024, 13(02), 919-933.
Article DOI: 10.30574/wjaets.2024.13.2.0650
DOI url: https://doi.org/10.30574/wjaets.2024.13.2.0650

Received on 17 November 2024; revised on 28 December 2024; accepted on 30 December 2024

MitM attacks pose a significant risk when unauthorized third parties grab and control the exchanged communications between different parties unnoticed. It describes the main ways a MitM attack can take place, and why knowing about passive and active approaches are crucial. Through examining how successful Man-in-the-Middle attacks are carried out, including reviewing networks, guessing passwords, and exploiting network protocols, the study points to the many and complicated ways cyber-attacks can happen. To help understand the process of launching an attack, various tools, such as Wireshark, Aircrack-ng, Hashcat, and Airgeddon, are explained. The article continues with strategies that hackers use to intercept and analyze traffic as well as to grab passwords for these types of attacks. Techniques and ideas such as encryption, monitoring networks, and preventing social engineering are studied as part of the review. Above all, this article aims to explain MitM threats further and recommend ways that companies can defend their networks in the current digital age.

Man-in-the-Middle; Wireless Security; Network Monitoring; Password Cracking; ARP Spoofing; Incident Response

https://wjaets.com/sites/default/files/fulltext_pdf/WJAETS-2024-0650.pdf

Get Your e Certificate of Publication using below link

Download Certificate

Preview Article PDF

Bogdan Barchuk. Man-in-the-Middle (MitM) Attacks: Techniques and defenses. World Journal of Advanced Engineering Technology and Sciences, 2024, 13(02), 919-933. Article DOI: https://doi.org/10.30574/wjaets.2024.13.2.0650

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content


Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


Copyright © 2026 World Journal of Advanced Engineering Technology and Sciences

Developed & Designed by VS Infosolution