ITM Tech Cybersecurity Essentials Booklet - Flipbook - Page 8
THREATS
MAN-IN-THEMIDDLE (MITM)
ATTACK
STEP 1: Hijacking the Session
Session
A MitM attack occurs when a hacker
inserts themselves between the
communications of a client and a
server. Here are some common
types of man-in-the-middle attacks:
VICTIM
192.168.1.23
SNIFFING
SERVER
Session Hijacking
Cybercriminals use session hijacking
to gain control of the victim’s
sessions and get access to resources
or data. The most common method
is IP spoofing, where the hijacker
uses the IP of the trusted client to
avail unauthorised services from a
server or application.
ATTACKER
STEP 2: Assuming the Victim’s IP Address
VICTIM
More than one
in four small
businesses have no
security plan at all.
8
Disconnected
SERVER
Compromised or
Copied Traffic
ATTACKER
192.168.1.23