I’ve been slowly working through an article series entitled “Understanding Man-In-The-Middle Attacks” for the last few months. The last article of this series was published a couple of weeks ago so I thought I’d post a quick roundup of them all. This series covers four different types of attacks, how they work, how to execute them, and how to protect yourself from them. These articles are being hosted on WindowsSecurity.com, whom I write for on a monthly basis.
You can read each article at its corresponding link:
- Part 1 – ARP Cache Poisoning
- Part 2 – DNS Spoofing
- Part 3 – Session Hijacking
- Part 4 – SSL Hijacking