Playpen Seminar
Title: |
Man in the middle (MITM) attack |
Time: |
22nd September 2005 (Thursday); 17:30 – 18:30 (H10) |
Venue: |
1009 |
Speaker: |
Alan S H Lam |
Abstracts
A man in the middle (MITM) attack is a well-known method in which an attacker sniffs, modifies, and inserts network packets between two parties without either party knowing that the link between them has been compromised. MITM attack is prevalent in wireless networks as attackers can easily tap into WLAN and then launch the attack even it is protected by WEP key. MITM attack could be a severe threat to e-commerce. This seminar discusses some techniques of MITM attack with live demonstration. The pros and cons of different countermeasures against MITIM attack are also discussed in this seminar.
Seminar Outlines
1. The working principle of MITM
2. MITM attack techniques (with live demos)
(a) ARP poisoning
(b) DNS hijack
(c) DNS poisoning
(d) Trojan Horse Program
3. The Threats
4. Countermeasures against MITM attack
*** ALL ARE WELCOME ***