Detecting man-in-the-middle attacks?
Posted
by Ilari Kajaste
on Super User
See other posts from Super User
or by Ilari Kajaste
Published on 2009-12-11T11:07:47Z
Indexed on
2010/04/24
16:53 UTC
Read the original article
Hit count: 479
There seem to be many possible ways to create man-in-the-middle attacks on public access points, by stealing the access point's local IP address with ARP spoofing. The possible attacks range from forging password request fields, to changing HTTPS connections to HTTP, and even the recently discovered possibilit of injecting malicious headers in the beginning of secure TLS connections.
However, it seems to be claimed that these attacks are not very common. It would be interesting to see for myself. What ways are there to detect if such an attack is being attempted by someone on the network?
I guess getting served a plain HTTP login page would be an obvious clue, and of course you could run Wireshark and keep reading all the interesting ARP traffic... But an automated solution would be a tiny bit more handy. Something that analyzes stuff on the background and alerts if an attack is detected on the network. It would be interesting to see for myself if these attack are actually going on somewhere.
© Super User or respective owner