0
0
Cybersecurityknowledge~10 mins

Man-in-the-middle attacks in Cybersecurity - Step-by-Step Execution

Choose your learning style9 modes available
Concept Flow - Man-in-the-middle attacks
User sends message
Attacker intercepts message
Attacker reads or alters message
Attacker forwards message to receiver
Receiver gets message, unaware of attack
The flow shows how an attacker secretly intercepts and possibly changes messages between two parties without their knowledge.
Execution Sample
Cybersecurity
User -> Attacker -> Receiver
Attacker intercepts and modifies message
Receiver receives altered message
This shows the path of a message being intercepted and changed by an attacker before reaching the receiver.
Analysis Table
StepActionMessage ContentAttacker's RoleReceiver's View
1User sends message"Hello"No action yetNo message received
2Attacker intercepts messageHelloIntercepts original messageNo message received
3Attacker modifies message"Hello, friend"Changes message contentNo message received
4Attacker forwards message"Hello, friend"Sends altered messageReceives "Hello, friend"
5Receiver replies"Hi!"No actionNo reply sent to user yet
6Attacker reads reply"Hi!"Reads replyNo reply sent to user yet
7Attacker forwards reply"Hi!"Sends reply to userMessage delivered
8User receives reply"Hi!"No actionReceives reply
💡 Communication ends with both parties unaware of the attacker’s presence.
State Tracker
VariableStartAfter Step 2After Step 3After Step 4After Step 7Final
Message ContentHelloHelloHello, friendHello, friendHi!Hi!
Attacker RolenullInterceptsModifiesForwardsForwardsnull
Receiver ViewNo messageNo messageNo messageHello, friendHello, friendHi!
Key Insights - 3 Insights
Why does the receiver not know the message was changed?
Because the attacker forwards the altered message as if it came directly from the user, shown in step 4 of the execution_table.
How can the attacker read the reply without the user noticing?
The attacker intercepts and reads the reply before forwarding it to the user, as shown in steps 5 to 7 in the execution_table.
Is the user aware of the attacker’s presence during communication?
No, the user receives messages normally without knowing they were intercepted, as shown in step 8.
Visual Quiz - 3 Questions
Test your understanding
Look at the execution_table, what message content does the receiver get at step 4?
A"Hello"
B"Hello, friend"
C"Hi!"
D"Hello, attacker"
💡 Hint
Check the 'Receiver's View' column at step 4 in the execution_table.
At which step does the attacker modify the message?
AStep 2
BStep 5
CStep 3
DStep 7
💡 Hint
Look at the 'Attacker's Role' and 'Action' columns in the execution_table.
If the attacker did not forward the reply to the user, what would happen?
AUser would not get any reply
BUser would receive the reply anyway
CReceiver would get the reply twice
DAttacker would be detected immediately
💡 Hint
Refer to the flow of messages in the execution_table steps 5 to 8.
Concept Snapshot
Man-in-the-middle attack:
- Attacker secretly intercepts communication
- Can read or change messages
- Both parties unaware of attacker
- Messages pass through attacker
- Common in unsecured networks
Full Transcript
A man-in-the-middle attack happens when an attacker secretly intercepts messages between two people communicating. The attacker can read or change the messages before sending them on. The user and receiver think they are talking directly, but the attacker is in the middle. This attack works because the attacker forwards messages so both sides do not notice anything wrong. The attacker can also intercept replies and forward them. This makes the communication unsafe without either party knowing.