MIMT i.e. Man In The Middle Attacks
Welcome to the blog series part 3. In previous posts , we have seen 2 methods that hackers use viz., Phishing and KeyLogging. In this article, I’m going to discuss about next Method i.e. MIME.

In this method, the hacker secretly relays and possibly alters the communication between the server and victim who believe they are directly communicating with each other.
The hacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the hacker.
The Hacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within reception range of wireless access point can insert himself as a man-in-the-middle.
How to avoid MIMT attacks?
* Use VPN services
*A proxy server to access the internet
* Use good antivirus with good firewall options


Leave a comment