Bruce answers Gloria by encrypting his message with what he thinks is Gloria's public key. You then can re-encrypt the message with Bruce's public key and send it to Bruce.ĥ. Gloria sends a message to Bruce, encrypted in what she thinks is Bruce's public key, but because she's using your yours, you can decrypt the message with your private key.Ĥ. You intercept this key, too, and send Gloria your public key.ģ. Bruce thinks he just received Gloria's public key, but he received yours.Ģ. Gloria sends her public key to Bruce, and you, the attacker, intercept the key and send Bruce your public key. This type of attack follows this process:ġ. They can then intercept messages sent from the victim to the host and pretend to be the host computer. A man-in-the-middle attack is a form of session hijacking. In a man-in-the-middle attack, attacker place themselves between the victim computer and another host computer.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |