Man-in-the-Middle (MitM) Attacks: Techniques and defenses

Bogdan Barchuk *

Independent researcher.
 
Review
World Journal of Advanced Engineering Technology and Sciences, 2024, 13(02), 919-933.
Article DOI: 10.30574/wjaets.2024.13.2.0650
Publication history: 
Received on 17 November 2024; revised on 28 December 2024; accepted on 30 December 2024
 
Abstract: 
MitM attacks pose a significant risk when unauthorized third parties grab and control the exchanged communications between different parties unnoticed. It describes the main ways a MitM attack can take place, and why knowing about passive and active approaches are crucial. Through examining how successful Man-in-the-Middle attacks are carried out, including reviewing networks, guessing passwords, and exploiting network protocols, the study points to the many and complicated ways cyber-attacks can happen. To help understand the process of launching an attack, various tools, such as Wireshark, Aircrack-ng, Hashcat, and Airgeddon, are explained. The article continues with strategies that hackers use to intercept and analyze traffic as well as to grab passwords for these types of attacks. Techniques and ideas such as encryption, monitoring networks, and preventing social engineering are studied as part of the review. Above all, this article aims to explain MitM threats further and recommend ways that companies can defend their networks in the current digital age.
 
Keywords: 
Man-in-the-Middle; Wireless Security; Network Monitoring; Password Cracking; ARP Spoofing; Incident Response
 
Full text article in PDF: