Requires Free Membership to View
The "man in the middle" attack is prevalent in wireless networks as well. In this kind of invasion, the attacker may place a rogue access point in a legitimate wireless network, configure the rogue access point with the valid SSID of the victim's wireless network and thus gather sensitive information from authorized users connecting to the wireless network. Some attackers also use a laptop with two wireless network cards, where one card acts as an access point and the other wireless card forwards all the connections from the access point card to the legitimate access point. In cryptography the "man in the middle" attack is particularly applicable to the original Diffie-Hellman Key exchange protocol, when used without authentication.
This was first published in September 2005
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation