What is a Man-in-the-Middle Attack?

Start learning cybersecurity with CBT Nuggets. courses.cbt.gg/security
In this video, Chuck Keith covers man in the middle attacks, specifically those prepared with ARP spoofing. He will define what a man in the middle attack is, how it works, and then explain how ARP spoofing can be used to substantially increase the potency of a typical MITM attack.
The Address Resolution Protocol, or ARP, is used to find the layer 2 address of the device associated with a given IP address. When someone wants to communicate with the rest of the internet, they must go through a default gateway - their router.
The router’s IP address is easy to discover, but you also need the MAC address. If the user doesn’t already have the MAC address stored in his ARP cache, he’ll use an ARP broadcast to send a request to everyone on his network, asking for the address.
The router is programmed to respond and provide its MAC address, but if someone is able to get in the middle and spoof the ARP, he can gain access to the user’s computer. Chuck will explain how these work and how to defend against them.
🌐 Download the Free Ultimate Networking Cert Guide: blog.cbt.gg/nnra
⬇️ 13-Week Study Plan: CCNA (200-301): blog.cbt.gg/u2tg
Start learning with CBT Nuggets:
• Cisco CCNA Security (210-260 IINS) | courses.cbt.gg/r6n
• Cisco CCNP Security | courses.cbt.gg/6t4
• CompTIA Security+ (SY0-501) | courses.cbt.gg/c26
• Information Security | courses.cbt.gg/463

Пікірлер: 27

  • @antondavis5368
    @antondavis53686 ай бұрын

    "I'm currently enrolled in a beginner's cybersecurity course, and once I've covered the course material, I often search for real-life KZread editorials. I'm always delighted when I come across your content because it's consistently concise and straight to the point. Your engaging presentation style is just the cherry on top! 😄"

  • @marusevitch
    @marusevitch Жыл бұрын

    *MrGlobalTraceAssets* , I would like to sincerely thank you from the BOTTOM of my heart! So many from tough harsh living conditions that suffer and you helping and giving them something that they desperately need just to survive. I thank God for wonderful people like you that are making the differences that truly matter most! God bless GlobaTraceAssets!!! Love from Greenville NC ❤

  • @soundintegritymusicproduct4127
    @soundintegritymusicproduct41272 жыл бұрын

    OMG that malcom in the middle pun.... did not see it coming

  • @thelonlypanda1

    @thelonlypanda1

    Жыл бұрын

    For real 😂, that was so great

  • @user-wj5ul9vr8o
    @user-wj5ul9vr8o3 жыл бұрын

    Nice Chuck!!

  • @ranjanadissanayaka5390
    @ranjanadissanayaka5390 Жыл бұрын

    thanks network chuck...good inspiration.😀

  • @exiled1gaming
    @exiled1gaming3 жыл бұрын

    It's when you are riding in the middle of a 3-seater truck and you start attacking the driver and the other passenger

  • @spenie5259
    @spenie52592 жыл бұрын

    As a victim of a MItM attack, already, how do I get my privacy back? All the articles on my search engine are only about how to PREVENT a MItM attack. Quite frustrating!

  • @anonymousx1857
    @anonymousx18573 жыл бұрын

    My hero, network chuck😎😎😀

  • @zdreamer86
    @zdreamer862 жыл бұрын

    Great video! Great analogy! however, ya'll got any more o that volume???

  • @davidtobar9519
    @davidtobar95193 жыл бұрын

    Surprised this doesnt have more views.

  • @franchise2570
    @franchise2570 Жыл бұрын

    Curious once your MitM device successfully spoofed the router how was it able to provide internet to access those webpages without a default internet route for Bob?

  • @khalefamondal3284
    @khalefamondal32842 жыл бұрын

    Sir how do i know that my email is a victim of man in the middle attack??? Sir I need your help

  • @iexist6021
    @iexist60213 жыл бұрын

    What about traffic through apps?

  • @powellthepog5624
    @powellthepog56242 жыл бұрын

    haha I remember that ARP video!

  • @mrchips1795
    @mrchips17953 жыл бұрын

    It's when you are dealing with an issue at work and all the other teams are pestering you

  • @jacobkanyi5046
    @jacobkanyi504610 ай бұрын

    the volume is too low, or is it just me? Good video though

  • @scottmcmahon7209
    @scottmcmahon720911 ай бұрын

    This Is Old school, you can't do this anymore lol. You will need to know the specific passwords and codes inorder for the router to permit you to do this lol.

  • @drakeo7594
    @drakeo75944 ай бұрын

    Your video is so quiet I had my volume all the way up and still had to have my head right next to the speaker to hear you. Please fix!

  • @abovethehorizon2023
    @abovethehorizon20233 жыл бұрын

    What if user uses VPN?

  • @h.fontanez5453

    @h.fontanez5453

    3 жыл бұрын

    This attack is performed once the attacker is inside the same network as the end user. To mitigate this attack port security techniques in the switch forwarding the traffic must be configured.

  • @abovethehorizon2023

    @abovethehorizon2023

    3 жыл бұрын

    @@h.fontanez5453 Thank you for replying. Can you tell me how can I monitor my co-worker network traffic? Is it possible to monitor if the employee uses VPN?

  • @DaleStrickland3

    @DaleStrickland3

    3 жыл бұрын

    @@abovethehorizon2023 ​companies use employee monitoring software like browsereporter or activtak to monitor web surfing

  • @Index-o1234
    @Index-o1234 Жыл бұрын

    Wow....traveler beware.

  • @gouravdhar7205
    @gouravdhar72052 жыл бұрын

    A man in the middle (MITM) attack is a general term for when a machine positions itself in between a connection between a client/user and the server/internet - either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway. To perform a man-in-the-middle-attack, you can follow the below link: blogs.gourav-dhar.com/man-in-the-middle-attack-by-arp-spoofing-tutorial-and-examples-e8f76d0b98f3