![]() It could be started by phishing techniques and in some cases coupled to the well-known Man-in-the-Browser (MitB) attack. The present paper aims at modelling and describing a new method of attack, named Browser-in-the-Middle (BitM) which, despite the similarities with MitM in the way it controls the data flow between a client and the service it accesses, bypasses some of MitM’s typical shortcomings. However, most of its many variants involve difficulties that make it not always possible. Main goal of MitM is to compromise confidentiality, integrity and availability of data flowing between source and destination. Man-in-the-Middle (MitM), one of the best known attacks in the world of computer security, is among the greatest concerns for professionals in the field. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |