首页 > Web开发 > 详细

Penetration Test - Select Your Attacks(5)

时间:2020-09-17 21:39:52      阅读:53      评论:0      收藏:0      [点我收藏+]

Man in the middle exploits

ADDITIONAL NETWORK EXPLOITS
  • Man-in-the-middle
    • Family of attacks where the attack intercepts messages between a sender and receiver
    • Attack may modify, regenerate, or forward intercepted messages

技术分享图片

技术分享图片

MAN-IN-THE-MIDDLE EXPLOITS
  • ARP spoofing
    • Similar to DNS poisoning, but with local MAC address
  • Pass the hash
    • Attacker intercepts an NTLM hash (user credential) and reuses it to appear as an authenticated user to Windows
  • Replay
  • Relay
  • SSL(Secure Sockets Layer) stripping
  • Downgrade
  • DoS(Denial of Service)/stress test
  • NAC(Network Access Control) bypass
  • VLAN (Virtual Local Area Network) hopping
QUICK REVIEW
  • MITM attacker intercepts all traffic between sender and receiver
  • May be part of an attack chain
  • Multiple MITM possibilities, including ARP spoofing, pass the hash, replay attack
  • Useful to bypass normal network security controls

Penetration Test - Select Your Attacks(5)

原文:https://www.cnblogs.com/keepmoving1113/p/13687710.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!