Geek Culture
Published in

Geek Culture

Cybersecurity — P8: Man-in-the-Middle Attack

Dino Cajic on MITM attacks Cybersecurity

The man-in-the-middle attack is an appropriate term for this type of attack. The network traffic is routed through the attackers machine and the hacker can see unencrypted data as it passes through.

How does man-in-the-middle attack work?

The Man-in-the-Middle attack works by having the attacker inject their machine between two devices…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Dino Cajic

Dino Cajic

599 Followers

Author of An Illustrative Introduction to Algorithms. IT Leader with a B.S. in Computer Science, a minor in Biology, and a passion for learning.