KenCrooker.com

Fingers Were Meant to be Inky

TwitterFacebookPhotosRSS
  • Home
  • Reviews
  • Pen Pain
  • Internet Safety
  • About
  • Contact
  • Toggle Mobile Menu
  • Back to Top

March 15, 2014 / Ken Crooker / Security, Tech / Leave a Comment

Hacking Types: Man In the Middle (MITM)

How a Man In The Middle Attack Works

There is no shortage of ways hackers get their hands on your sensitive data. And usually, when the industry catches up and patches the vulnerabilities, the hackers find others holes to exploit. It’s a never-ending cycle. And because computers are so sophisticated these days, the hackers come up with equally sophisticated types of hacks. I’ve already described what Phishing is. Today I want to cover another hacking method, one you may have heard a lot about recently: the Man In the Middle (or MITM) attack.

WHAT DOES “MAN IN THE MIDDLE” MEAN?

In very simple terms, it’s when an attacker places himself between you and a business (or another person), and intercepts the data going back and forth between the two of you, typically impersonating the business or other person. This type of attack occurs in both the real world and on the Internet. In the real world, it is usually accomplished through scam phone calls or letters that ultimately try to get you to hand over your money or credit card numbers. On the Internet, it is typically accomplished by using wifi routers.

According to the security experts at Kaspersky Lab, one way an attacker can facilitate such an attack is by setting up a malicious wifi router that looks legitimate. They could set up their laptop to look like a wifi hotspot, offering free wifi to people in busy places. Then, as people connect to their evil hotspot to get the free Internet access and access sensitive sites (e.g., banks, other accounts), the attacker can collect that user’s login credentials and use them to access their accounts at a later time.

Attackers can also use legitimate home or business wifi routers to facilitate a MITM attack by exploiting security holes in those routers. These security holes allow the attacker to hack into them and eavesdrop on the data transactions conducted over the router.

SO WHAT CAN YOU DO?

To avoid being a MITM victim, I advise you to never use public or open wifi to access the Internet. Many businesses, such as coffee shops and grocery stores, offer free, open wifi as a convenience to their customers. But it’s easy for hackers to exploit the open routers or to spoof the routers and set up additional, evil, hotspots that trick people into thinking it’s from a legitimate business. So if there’s a router out there that allows you to connect to the Internet without entering a password, just don’t do it.

If at some point you absolutely must connect to the Internet using open wifi, use a tool that forces a secure browsing connection IF THE OPTION IS AVAILABLE (not all sites offer secure connections). There are two browser plugins that you can use: HTTPS Everywhere and ForceTLS. These tools don’t guarantee a secure connection, but if the site you’re visiting allows secure connections, these tools will ensure they are enforced. You can tell your connection is secure if the “http” at the beginning of the site name has an “s” on the end (For example: https://www.google.com).

If you found this useful, click some of these buttons to share it!

  • Facebook
  • Twitter
  • Pinterest
  • Reddit
  • More
  • Email
  • LinkedIn
  • Tumblr
  • Pocket
  • Print

Related

hackers scam security technology

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

What’s Next?

You may have noticed that I haven't posted anything in a really long time. Sorry about that. Once we started up the St. Louis Pen Show and the St. Louis pen meetups, most of my free "pen time" started going into those activities.

My goal was always to write very thorough reviews with lots of great pictures, and that takes a ton of time. The writing, editing, and photo editing for one review took up a full weekend, and that doesn't take into account actually using the pens and taking notes along the way. With all I have going on, it just wasn't sustainable to keep this site going on a consistent basis.

Will I ever come back and start doing reviews again? Maybe. But not anytime soon. I am still around, though. You can catch me at the monthly St. Louis Area Pen Meetup & Eats (SLAPME) events, the St. Louis Pen Show, and a handful of other pen shows around the country.

Subscribe!

Type your email, click Subscribe, and you'll get notified via email when I post!

Categories

Babble Commentary Conspiracy Entertainment Fountain Pens Ink Music Paper Pen Pain Photography Reviews Security Social Tech Tutorials Uncategorized

Copyright KenCrooker.com

 

Loading Comments...