Playpen Seminar

Title:

Man in the middle (MITM) attack

Time:

22nd September 2005 (Thursday); 17:30 – 18:30 (H10)

Venue:

1009 Engineering Building Phase II

Speaker:

Alan S H Lam

 

 

Playpen Slides

 

MITM Presentation Slides

 

DEMO

 

 

 

Abstracts

A man in the middle (MITM) attack is a well-known method in which an attacker sniffs, modifies, and inserts network packets between two parties without either party knowing that the link between them has been compromised. MITM attack is prevalent in wireless networks as attackers can easily tap into WLAN and then launch the attack even it is protected by WEP key. MITM attack could be a severe threat to e-commerce. This seminar discusses some techniques of MITM attack with live demonstration. The pros and cons of different countermeasures against MITIM attack are also discussed in this seminar.

 

 

Seminar Outlines

1.      The working principle of MITM

2.      MITM attack techniques (with live demos)

(a)        ARP poisoning

(b)       DNS hijack

(c)        DNS poisoning

(d)       Trojan Horse Program

3.      The Threats

4.      Countermeasures against MITM attack

 

 

 

*** ALL ARE WELCOME ***