What is a Man-in-the-Middle Attack?
Start learning cybersecurity with CBT Nuggets. courses.cbt.gg/security
In this video, Chuck Keith covers man in the middle attacks, specifically those prepared with ARP spoofing. He will define what a man in the middle attack is, how it works, and then explain how ARP spoofing can be used to substantially increase the potency of a typical MITM attack.
The Address Resolution Protocol, or ARP, is used to find the layer 2 address of the device associated with a given IP address. When someone wants to communicate with the rest of the internet, they must go through a default gateway - their router.
The router’s IP address is easy to discover, but you also need the MAC address. If the user doesn’t already have the MAC address stored in his ARP cache, he’ll use an ARP broadcast to send a request to everyone on his network, asking for the address.
The router is programmed to respond and provide its MAC address, but if someone is able to get in the middle and spoof the ARP, he can gain access to the user’s computer. Chuck will explain how these work and how to defend against them.
🌐 Download the Free Ultimate Networking Cert Guide: blog.cbt.gg/nnra
⬇️ 13-Week Study Plan: CCNA (200-301): blog.cbt.gg/u2tg
Start learning with CBT Nuggets:
• Cisco CCNA Security (210-260 IINS) | courses.cbt.gg/r6n
• Cisco CCNP Security | courses.cbt.gg/6t4
• CompTIA Security+ (SY0-501) | courses.cbt.gg/c26
• Information Security | courses.cbt.gg/463
Пікірлер: 27
"I'm currently enrolled in a beginner's cybersecurity course, and once I've covered the course material, I often search for real-life KZread editorials. I'm always delighted when I come across your content because it's consistently concise and straight to the point. Your engaging presentation style is just the cherry on top! 😄"
*MrGlobalTraceAssets* , I would like to sincerely thank you from the BOTTOM of my heart! So many from tough harsh living conditions that suffer and you helping and giving them something that they desperately need just to survive. I thank God for wonderful people like you that are making the differences that truly matter most! God bless GlobaTraceAssets!!! Love from Greenville NC ❤
OMG that malcom in the middle pun.... did not see it coming
@thelonlypanda1
Жыл бұрын
For real 😂, that was so great
Nice Chuck!!
thanks network chuck...good inspiration.😀
It's when you are riding in the middle of a 3-seater truck and you start attacking the driver and the other passenger
As a victim of a MItM attack, already, how do I get my privacy back? All the articles on my search engine are only about how to PREVENT a MItM attack. Quite frustrating!
My hero, network chuck😎😎😀
Great video! Great analogy! however, ya'll got any more o that volume???
Surprised this doesnt have more views.
Curious once your MitM device successfully spoofed the router how was it able to provide internet to access those webpages without a default internet route for Bob?
Sir how do i know that my email is a victim of man in the middle attack??? Sir I need your help
What about traffic through apps?
haha I remember that ARP video!
It's when you are dealing with an issue at work and all the other teams are pestering you
the volume is too low, or is it just me? Good video though
This Is Old school, you can't do this anymore lol. You will need to know the specific passwords and codes inorder for the router to permit you to do this lol.
Your video is so quiet I had my volume all the way up and still had to have my head right next to the speaker to hear you. Please fix!
What if user uses VPN?
@h.fontanez5453
3 жыл бұрын
This attack is performed once the attacker is inside the same network as the end user. To mitigate this attack port security techniques in the switch forwarding the traffic must be configured.
@abovethehorizon2023
3 жыл бұрын
@@h.fontanez5453 Thank you for replying. Can you tell me how can I monitor my co-worker network traffic? Is it possible to monitor if the employee uses VPN?
@DaleStrickland3
3 жыл бұрын
@@abovethehorizon2023 companies use employee monitoring software like browsereporter or activtak to monitor web surfing
Wow....traveler beware.
A man in the middle (MITM) attack is a general term for when a machine positions itself in between a connection between a client/user and the server/internet - either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway. To perform a man-in-the-middle-attack, you can follow the below link: blogs.gourav-dhar.com/man-in-the-middle-attack-by-arp-spoofing-tutorial-and-examples-e8f76d0b98f3