Project information

  • Category: Software Attack & Linux
  • Program Language: Shell
  • Project date: Jen 31, 2023
  • Project URL: Link

Man-in-the-middle attack

A man-in-the-middle (MITM) attack is a type of cyber attack where an attacker intercepts and relays communication between two parties without their knowledge. The attacker secretly inserts themselves between the sender and receiver, allowing them to eavesdrop on the communication or even manipulate the data being exchanged. During a MITM attack, the attacker may be able to capture sensitive information such as login credentials, financial data, or personal information. They can also modify the communication to inject malicious content or redirect the users to fake websites. There are various techniques used in MITM attacks, including ARP spoofing, DNS spoofing, session hijacking, and SSL/TLS interception. These attacks can occur in both wired and wireless networks, and they pose a significant threat to the security and privacy of individuals and organizations.


It was possible to pretend to be the recipient PC, so we managed to receive all the traffic, like the site in http so we received some information such as images Through this tutorial I understood the importance of the MITM attack in the context of cyber security. Gaining knowledge about this type of attack is crucial, especially for IT companies. It is therefore crucial to encrypt every data and site that is used. During the tutorial, we encountered some limitations regarding the type of interface used to represent the data and the choice of HTTP sites instead of HTTPS, since we were not yet able to decrypt the encrypted data.