Manipulator-in-the-middle attack
Thank you for visiting OWASP.org. We have migrated our community to a new web platform and regretably the content for this page needed to be programmatically ported from its previous wiki page. There’s still some work to be done.
This is an example of a Project or Chapter Page.
Description
The Manipulator-in-the middle attack (MITM) intercepts a communication between two systems. For example, in an http transaction the target is the TCP connection between client and server. Using different techniques, the attacker splits the original TCP connection into 2 new connections, one between the client and the attacker and the other between the attacker and the server, as shown in figure 1. Once the TCP connection is intercepted, the attacker acts as a proxy, being able to read, insert and modify the data in the intercepted communication.
The MITM attack is very effective because of the nature of the http protocol and data transfer which are all ASCII based. In this way, it’s possible to view and interview within the http protocol and also in the data transferred. So, for example, it’s possible to capture a session cookie reading the http header, but it’s also possible to change an amount of money transaction inside the application context, as shown in figure 1.

Examples
TBD
Related Threat Agents
Related Attacks
Related Vulnerabilities
Related Controls
References
- http://www.sans.org/reading_room/whitepapers/threats/480.php
- http://cwe.mitre.org/data/definitions/300.html
- http://resources.infosecinstitute.com/video-man-in-the-middle-howto/
- http://en.wikipedia.org/wiki/Man-in-the-middle_attack
Category:OWASP ASDR Project could these all be links? could these all be links? these aren’t threat agents Category:Spoofing Category:Attack