• Penetration Test


    Man in the middle exploits

    ADDITIONAL NETWORK EXPLOITS
    • Man-in-the-middle
      • Family of attacks where the attack intercepts messages between a sender and receiver
      • Attack may modify, regenerate, or forward intercepted messages

    image-20200917205931797

    image-20200917210057779

    MAN-IN-THE-MIDDLE EXPLOITS
    • ARP spoofing
      • Similar to DNS poisoning, but with local MAC address
    • Pass the hash
      • Attacker intercepts an NTLM hash (user credential) and reuses it to appear as an authenticated user to Windows
    • Replay
    • Relay
    • SSL(Secure Sockets Layer) stripping
    • Downgrade
    • DoS(Denial of Service)/stress test
    • NAC(Network Access Control) bypass
    • VLAN (Virtual Local Area Network) hopping
    QUICK REVIEW
    • MITM attacker intercepts all traffic between sender and receiver
    • May be part of an attack chain
    • Multiple MITM possibilities, including ARP spoofing, pass the hash, replay attack
    • Useful to bypass normal network security controls
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    关于代码手写UI,xib和StoryBoard
    封装自己的framework静态库
    AsyncDisplayKit
    RunLoop
    AFNetworking2.0源码解析<三>
    AFNetworking2.0源码解析<四>
    AFNetworking2.0源码解析<二>
    AFNetworking2.0源码解析<一>
    多线程
    Mac svn 命令
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13687710.html
Copyright © 2020-2023  润新知